General

  • Target

    5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073

  • Size

    639KB

  • Sample

    241109-dc7kcaylfp

  • MD5

    ff18e2586d26e4e48c80ecf6888b805f

  • SHA1

    da2944ddaed5b0166a75696de55dc5b53628aa1f

  • SHA256

    5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073

  • SHA512

    8de30aeb04b33e3ae357c4464ff919bb42fe96848d84a7c8160a759f816f309ce1cc588e99cec99e3b335851a13884a4368eccbd86af3d316f222e50ff65a629

  • SSDEEP

    12288:uMrvy90u59xaonHb41UIMiYb1tCdBZWyWrVohOGJyQ6/nnV+rRcID0:ByB59AYHb41UIImdxNT6/nQrSZ

Malware Config

Extracted

Family

amadey

Version

3.86

Botnet

88c8bb

C2

http://77.91.68.61

Attributes
  • install_dir

    925e7e99c5

  • install_file

    pdates.exe

  • strings_key

    ada76b8b0e1f6892ee93c20ab8946117

  • url_paths

    /rock/index.php

rc4.plain

Extracted

Family

redline

Botnet

gotad

C2

77.91.124.84:19071

Attributes
  • auth_value

    3fb7c1f3fcf68bc377eae3f6f493a684

Targets

    • Target

      5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073

    • Size

      639KB

    • MD5

      ff18e2586d26e4e48c80ecf6888b805f

    • SHA1

      da2944ddaed5b0166a75696de55dc5b53628aa1f

    • SHA256

      5a867014cfa52a36ffc8e49a22d0bb59ab81e3986203b0c5f8ba20260b8af073

    • SHA512

      8de30aeb04b33e3ae357c4464ff919bb42fe96848d84a7c8160a759f816f309ce1cc588e99cec99e3b335851a13884a4368eccbd86af3d316f222e50ff65a629

    • SSDEEP

      12288:uMrvy90u59xaonHb41UIMiYb1tCdBZWyWrVohOGJyQ6/nnV+rRcID0:ByB59AYHb41UIImdxNT6/nQrSZ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Smokeloader family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks