General

  • Target

    0436f476ace72a64e43aa48ec1c67ca3a7bc42c76da5061e0c87bc3cb9a868a4

  • Size

    515KB

  • Sample

    241110-rytghaxrey

  • MD5

    43397628cfb389602a3d0e9c5465f258

  • SHA1

    deca2b8107ee6f984dcd12c263f1e8900778eb3b

  • SHA256

    0436f476ace72a64e43aa48ec1c67ca3a7bc42c76da5061e0c87bc3cb9a868a4

  • SHA512

    0ce3f67074f3507ee5531a62507d5adc05cff1a8c4468d95efc607d16a7d237d1cf4eefa92c0fd99fa4dbf3caff38e2e56276d7155c31ff9128560c43bd6625a

  • SSDEEP

    12288:hMrWy908vTZ5w7c4UJ1SuebIhlBqyB2kr76ym8Ytw0nsllx:ryJvTZ5iw1rebIpqu3lmBMlx

Malware Config

Extracted

Family

amadey

Version

3.85

Botnet

de7e5a

C2

http://77.91.68.3

Attributes
  • install_dir

    3ec1f323b5

  • install_file

    danke.exe

  • strings_key

    827021be90f1e85ab27949ea7e9347e8

  • url_paths

    /home/love/index.php

rc4.plain

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Targets

    • Target

      0436f476ace72a64e43aa48ec1c67ca3a7bc42c76da5061e0c87bc3cb9a868a4

    • Size

      515KB

    • MD5

      43397628cfb389602a3d0e9c5465f258

    • SHA1

      deca2b8107ee6f984dcd12c263f1e8900778eb3b

    • SHA256

      0436f476ace72a64e43aa48ec1c67ca3a7bc42c76da5061e0c87bc3cb9a868a4

    • SHA512

      0ce3f67074f3507ee5531a62507d5adc05cff1a8c4468d95efc607d16a7d237d1cf4eefa92c0fd99fa4dbf3caff38e2e56276d7155c31ff9128560c43bd6625a

    • SSDEEP

      12288:hMrWy908vTZ5w7c4UJ1SuebIhlBqyB2kr76ym8Ytw0nsllx:ryJvTZ5iw1rebIpqu3lmBMlx

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Smokeloader family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks