General

  • Target

    99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96

  • Size

    642KB

  • Sample

    241105-gfzkpavnex

  • MD5

    53f933f011bc702fbc354f4392049d29

  • SHA1

    2337f02d13c7078b38291eb169c371a507011fb5

  • SHA256

    99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96

  • SHA512

    ddb6a58654307dc76b03414b0a3ea8a72dae5aa4d50fa7c7ca298eb1908c0b4f0e17a65d73f5dec362cfeec1786597bed751eee00cb33cdb70cb469995386e94

  • SSDEEP

    12288:9MrLy90A2Z/OzbtCrPeFotrt6midImA2wqK6n3/S+rkU67zVnMRDn:Cyt2szbgrmypidIX+rvgpnMRDn

Malware Config

Extracted

Family

amadey

Version

3.86

Botnet

88c8bb

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

gotad

C2

77.91.124.84:19071

Attributes
  • auth_value

    3fb7c1f3fcf68bc377eae3f6f493a684

Targets

    • Target

      99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96

    • Size

      642KB

    • MD5

      53f933f011bc702fbc354f4392049d29

    • SHA1

      2337f02d13c7078b38291eb169c371a507011fb5

    • SHA256

      99aba006f0b570e62e072dca26996e92b876227bc6f4b85117d39adec3cb4a96

    • SHA512

      ddb6a58654307dc76b03414b0a3ea8a72dae5aa4d50fa7c7ca298eb1908c0b4f0e17a65d73f5dec362cfeec1786597bed751eee00cb33cdb70cb469995386e94

    • SSDEEP

      12288:9MrLy90A2Z/OzbtCrPeFotrt6midImA2wqK6n3/S+rkU67zVnMRDn:Cyt2szbgrmypidIX+rvgpnMRDn

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Smokeloader family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks