General
-
Target
f2f7d8b385e3de2b804c3cde34f99b107a340b2fc92e318adee33e77b2780e25
-
Size
1.2MB
-
Sample
241111-a2na8aygkf
-
MD5
3324e44cdf42a81b7d01075bd45b9a6a
-
SHA1
3840a48cfad4db4ff5447c63973328071138a23c
-
SHA256
f2f7d8b385e3de2b804c3cde34f99b107a340b2fc92e318adee33e77b2780e25
-
SHA512
fa91f3d053a0add257cc9db7ebe4f238297ebc2a8c4138bbfb9920cba0f5b2a8dc4525b6c63b12377e6ef68735355d80b2f1657ea2819f9b2ce223b310ec2cf4
-
SSDEEP
24576:aZ/i8viZtNWceh50KP+8HInX9+nsbl54gOOm1J30y8zY:mi86ZTu7tWntyshqgOOoS
Static task
static1
Behavioral task
behavioral1
Sample
f2f7d8b385e3de2b804c3cde34f99b107a340b2fc92e318adee33e77b2780e25.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f2f7d8b385e3de2b804c3cde34f99b107a340b2fc92e318adee33e77b2780e25.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Targets
-
-
Target
f2f7d8b385e3de2b804c3cde34f99b107a340b2fc92e318adee33e77b2780e25
-
Size
1.2MB
-
MD5
3324e44cdf42a81b7d01075bd45b9a6a
-
SHA1
3840a48cfad4db4ff5447c63973328071138a23c
-
SHA256
f2f7d8b385e3de2b804c3cde34f99b107a340b2fc92e318adee33e77b2780e25
-
SHA512
fa91f3d053a0add257cc9db7ebe4f238297ebc2a8c4138bbfb9920cba0f5b2a8dc4525b6c63b12377e6ef68735355d80b2f1657ea2819f9b2ce223b310ec2cf4
-
SSDEEP
24576:aZ/i8viZtNWceh50KP+8HInX9+nsbl54gOOm1J30y8zY:mi86ZTu7tWntyshqgOOoS
-
Amadey family
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1