General

  • Target

    00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3

  • Size

    705KB

  • Sample

    250131-mfes6svngj

  • MD5

    f67aac6e64021331802841e1ab6a1284

  • SHA1

    0e5443344edfba236e919e9f7633051a7dfa1fa4

  • SHA256

    00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3

  • SHA512

    d592a740b682e0927479c75e0299de623ebce19ab3e837f5f4aedbc863ec469c98878dca9b5f55c8a0e3c5701d74469be0236edc9a3fe35696d78f506428998c

  • SSDEEP

    12288:UMrVy90bD0VCvCdg5EBeTy0PdSZc1wxcLPYPVpyddt5i8RUu8684l:Ry6o+0ePBp1wiLPOAtm4l

Malware Config

Extracted

Family

amadey

Version

3.87

Botnet

59b440

C2

http://77.91.68.18

Attributes
  • install_dir

    b40d11255d

  • install_file

    saves.exe

  • strings_key

    fa622dfc42544927a6471829ee1fa9fe

  • url_paths

    /nice/index.php

rc4.plain

Extracted

Family

redline

Botnet

stas

C2

77.91.124.82:19071

Attributes
  • auth_value

    db6d96c4eade05afc28c31d9ad73a73c

Targets

    • Target

      00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3

    • Size

      705KB

    • MD5

      f67aac6e64021331802841e1ab6a1284

    • SHA1

      0e5443344edfba236e919e9f7633051a7dfa1fa4

    • SHA256

      00fa85d1b7df666624e986fae4bb65de8602d49d09f37e7a8a04bb52470febb3

    • SHA512

      d592a740b682e0927479c75e0299de623ebce19ab3e837f5f4aedbc863ec469c98878dca9b5f55c8a0e3c5701d74469be0236edc9a3fe35696d78f506428998c

    • SSDEEP

      12288:UMrVy90bD0VCvCdg5EBeTy0PdSZc1wxcLPYPVpyddt5i8RUu8684l:Ry6o+0ePBp1wiLPOAtm4l

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks