General

  • Target

    0123685221e8f4bbe288ada7dd1d6c960a94af37ed7e4f55bcff7f81aa4a3507

  • Size

    1.7MB

  • Sample

    240507-wq4pqaha9w

  • MD5

    c44937f9a9a1dd00e1a9e71315cb668d

  • SHA1

    64c27b452325c47d95078b26ff18cc6c0a23541a

  • SHA256

    0123685221e8f4bbe288ada7dd1d6c960a94af37ed7e4f55bcff7f81aa4a3507

  • SHA512

    c41ec1da4f84cccd1454658efd2d31503d53baf9f90abfadb49b484ba840c2396f600120a1e36c746735c1dcf06235bae368978a4db1ed5f34f33a0459dcfcbf

  • SSDEEP

    49152:a4gu4265mdWpCE9uktqnYGNanFYLd0bBsAORlwCg4:wrV5mdcCEZtqnYGNanYebGNRl7

Malware Config

Extracted

Family

amadey

Version

3.80

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Extracted

Family

redline

Botnet

most

C2

185.161.248.73:4164

Attributes
  • auth_value

    7da4dfa153f2919e617aa016f7c36008

Targets

    • Target

      0123685221e8f4bbe288ada7dd1d6c960a94af37ed7e4f55bcff7f81aa4a3507

    • Size

      1.7MB

    • MD5

      c44937f9a9a1dd00e1a9e71315cb668d

    • SHA1

      64c27b452325c47d95078b26ff18cc6c0a23541a

    • SHA256

      0123685221e8f4bbe288ada7dd1d6c960a94af37ed7e4f55bcff7f81aa4a3507

    • SHA512

      c41ec1da4f84cccd1454658efd2d31503d53baf9f90abfadb49b484ba840c2396f600120a1e36c746735c1dcf06235bae368978a4db1ed5f34f33a0459dcfcbf

    • SSDEEP

      49152:a4gu4265mdWpCE9uktqnYGNanFYLd0bBsAORlwCg4:wrV5mdcCEZtqnYGNanYebGNRl7

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Detects executables packed with ConfuserEx Mod

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks