General

  • Target

    6cb4137cb7e29807e2044a791bde68687eda33a963906bc6516ead304075be56.exe

  • Size

    589KB

  • Sample

    250207-3wj1tsvqbn

  • MD5

    0f3eadc3ab8541461b82a4cb7a06d2fd

  • SHA1

    98768d1dc1fd7a105c37a2867a57c6ea098a0afe

  • SHA256

    6cb4137cb7e29807e2044a791bde68687eda33a963906bc6516ead304075be56

  • SHA512

    f6a51063d1deeb496ac7cb963a76585e4fc5ecfdca3a849b1f91efeb042c559834e6ca74b98b3e03f33d82379a43f68b28fb320985121189c8ff101610cd1028

  • SSDEEP

    12288:yMrcy90/R9/Oi6+TuHl0em1kqtKmENNfgAchF+DThTFDt2dYS1U5alR:KyE9/7Cl0aqtKFNQhFuHDcddMalR

Malware Config

Extracted

Family

amadey

Version

3.70

Botnet

b50502

C2

http://77.91.124.207

Attributes
  • install_dir

    595f021478

  • install_file

    oneetx.exe

  • strings_key

    6e3d32d239380a49b6f83128fe71ea01

  • url_paths

    /plays/chapter/index.php

rc4.plain

Targets

    • Target

      6cb4137cb7e29807e2044a791bde68687eda33a963906bc6516ead304075be56.exe

    • Size

      589KB

    • MD5

      0f3eadc3ab8541461b82a4cb7a06d2fd

    • SHA1

      98768d1dc1fd7a105c37a2867a57c6ea098a0afe

    • SHA256

      6cb4137cb7e29807e2044a791bde68687eda33a963906bc6516ead304075be56

    • SHA512

      f6a51063d1deeb496ac7cb963a76585e4fc5ecfdca3a849b1f91efeb042c559834e6ca74b98b3e03f33d82379a43f68b28fb320985121189c8ff101610cd1028

    • SSDEEP

      12288:yMrcy90/R9/Oi6+TuHl0em1kqtKmENNfgAchF+DThTFDt2dYS1U5alR:KyE9/7Cl0aqtKFNQhFuHDcddMalR

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender TamperProtection settings

    • Modifies Windows Defender notification settings

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks