General

  • Target

    1f210d47513efff7a9a7d84e8bdbc490380fb3db0debdc06cab638be271070c1

  • Size

    1.1MB

  • Sample

    241104-rl7hlatmcr

  • MD5

    56e9ca9cdc683f3f1c3ff00530b79b33

  • SHA1

    97f592e4b396789d829416ade431fd3f1b2d48f3

  • SHA256

    1f210d47513efff7a9a7d84e8bdbc490380fb3db0debdc06cab638be271070c1

  • SHA512

    582500183f7adac19b664592d7633e42d300cb3567fdf0a6f140ebf857888415fa1899a471c633e0003a146870ab26a242f089fcfc0163ac008f69f46dd9a7d1

  • SSDEEP

    24576:RyeztEsIwjbVrmsQQL+UsBPIn2a3oYhoGbP:EezzXjborvUsBPInJLOGb

Malware Config

Extracted

Family

amadey

Version

3.80

Botnet

9c0adb

C2

http://193.3.19.154

Attributes
  • install_dir

    cb7ae701b3

  • install_file

    oneetx.exe

  • strings_key

    23b27c80db2465a8e1dc15491b69b82f

  • url_paths

    /store/games/index.php

rc4.plain

Targets

    • Target

      1f210d47513efff7a9a7d84e8bdbc490380fb3db0debdc06cab638be271070c1

    • Size

      1.1MB

    • MD5

      56e9ca9cdc683f3f1c3ff00530b79b33

    • SHA1

      97f592e4b396789d829416ade431fd3f1b2d48f3

    • SHA256

      1f210d47513efff7a9a7d84e8bdbc490380fb3db0debdc06cab638be271070c1

    • SHA512

      582500183f7adac19b664592d7633e42d300cb3567fdf0a6f140ebf857888415fa1899a471c633e0003a146870ab26a242f089fcfc0163ac008f69f46dd9a7d1

    • SSDEEP

      24576:RyeztEsIwjbVrmsQQL+UsBPIn2a3oYhoGbP:EezzXjborvUsBPInJLOGb

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks