{"id":167990,"date":"2023-05-05T14:30:10","date_gmt":"2023-05-05T21:30:10","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=167990"},"modified":"2023-07-11T11:05:31","modified_gmt":"2023-07-11T18:05:31","slug":"deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/","title":{"rendered":"Deconstructing Amadey&#8217;s Latest Multi-Stage Attack and Malware Distribution"},"content":{"rendered":"<p>Authored by <span class=\"TextRun SCXW29248347 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW29248347 BCX0\" data-ccp-charstyle=\"blogheading\" data-ccp-charstyle-defn=\"{&quot;ObjectId&quot;:&quot;4bacc027-1347-40e8-9017-8fff691b68dd|232&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[469775450,&quot;blogheading&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;blogheading&quot;,335572020,&quot;1&quot;,469778324,&quot;Default Paragraph Font&quot;]}\">By Yashvi Shah<\/span><\/span><span class=\"EOP SCXW29248347 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">McAfee Labs have identified an increase in Wextract.exe samples<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> that drop a malware payload at multiple stages. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Wextract.exe is a Windows executable file that is used to extract files from a cabinet (.cab) file. Cabinet files are compressed archives that are used to package and distribute software, drivers, and other files. It is a legitimate file that is part of the Windows operating system, and it is located in the System32 folder of the Windows directory. However, like other executable files, it can be vulnerable to exploitation by malicious actors who might use it as a disguise for malware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Some common ways that malicious actors use a fake or modified version of wextract.exe include:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Malware Distribution<\/span><\/b><span data-contrast=\"auto\">: Malicious actors can use a fake version of the wextract.exe to deliver malware onto a victim&#8217;s computer. They can disguise the malware as a legitimate file and use the fake wextract.exe to extract and execute the malicious code.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Information stealing<\/span><\/b><span data-contrast=\"auto\">: A fake or modified wextract.exe can be used to steal sensitive information from a victim&#8217;s computer. Malicious actors can modify the code to include keyloggers or other data-stealing techniques.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Remote Access<\/span><\/b><span data-contrast=\"auto\">: Malicious actors can use a fake wextract.exe to gain remote access to a victim&#8217;s computer. They can use the modified wextract.exe to create a backdoor or establish a remote connection to the victim&#8217;s computer, allowing them to carry out various malicious activities.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Ransomware Delivery<\/span><\/b><span data-contrast=\"auto\">: Malicious actors can use a fake or modified &#8220;wextract.exe&#8221; to install ransomware on a victim&#8217;s system. For example, they may create a fake Windows Installer package that appears to be a legitimate software update or utility but also includes a modified &#8220;wextract.exe&#8221; that encrypts the victim&#8217;s files and demand<\/span><span data-contrast=\"auto\">s <\/span><span data-contrast=\"auto\">a ransom payment for their decryption. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">McAfee Labs collected malicious wextract.exe samples from the wild, and its behavior was analyzed. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This blog provides a detailed technical analysis of malicious &#8220;wextract.exe&#8221; that is used as a delivery mechanism for multiple types of malware<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">, including Amadey and Redline Stealer. It also provides detailed information on the techniques used by the malware to evade detection by security software and execute its payload. Once the malware payloads are executed on the system, they establish communication with a Command and Control (C2) server controlled by the attacker. This communication allows the attacker to exfiltrate data from the victim&#8217;s system, including sensitive information such as login credentials, financial data, and other personal information.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-167992\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture1.jpg\" alt=\"\" width=\"587\" height=\"269\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture1.jpg 587w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture1-300x137.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture1-205x94.jpg 205w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW6629878 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW6629878 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW6629878 BCX0\"><span class=\"TextRun SCXW6629878 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW6629878 BCX0\" data-ccp-parastyle=\"caption\">1<\/span><\/span><\/span><span class=\"TextRun SCXW6629878 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW6629878 BCX0\" data-ccp-parastyle=\"caption\">: <\/span><span class=\"NormalTextRun SCXW6629878 BCX0\" data-ccp-parastyle=\"caption\">Characteristic<\/span><span class=\"NormalTextRun SCXW6629878 BCX0\" data-ccp-parastyle=\"caption\"> of the file<\/span><\/span><span class=\"EOP SCXW6629878 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">The file is a 32-bit Portable Executable file, which is 631.50 Kb in size. The original name of the file is WEXTRACT.EXE.MUI. The file description is &#8220;\u0421\u0430\u043c\u043e\u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 CAB-\u0444\u0430\u0439\u043b\u043e\u0432 Win32&#8221;, written in Russian, and means &#8220;Self-Extracting Win32 CAB Files&#8221;. The legal copyright mentions Microsoft Corporation. A lot of static strings of this file were found to be written in Russian.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Normally, the resource section (.rsrc) contains resources used by the program, such as icons, bitmaps, strings, and dialog boxes. Attackers leverage the resource section of a PE file to improve the success of their attacks by evading detection, enhancing persistence, and adding functionality.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The resource section of this sample has multiples files, out of which CABINET resource holds 75.75% of the total file, which makes the said resource suspicious.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168006\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture2.jpg\" alt=\"\" width=\"626\" height=\"172\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture2.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture2-300x82.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture2-205x56.jpg 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW123898361 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW123898361 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW123898361 BCX0\"><span class=\"TextRun SCXW123898361 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW123898361 BCX0\" data-ccp-parastyle=\"caption\">2<\/span><\/span><\/span><span class=\"TextRun SCXW123898361 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW123898361 BCX0\" data-ccp-parastyle=\"caption\">: Resources in the file<\/span><\/span><span class=\"EOP SCXW123898361 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">A CAB (Cabinet) file is a compressed archive file format that is often used to compress and package multiple files into a single file for distribution or installation. A CAB file in the resource section of a PE file can be used for various purposes such as storing additional program files or data, including language-specific resources, or compressing and storing commonly used resources to reduce the size of the executable.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The CABINET holds two executables, cydn.exe and vona.exe.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168020\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture3.jpg\" alt=\"\" width=\"752\" height=\"258\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture3.jpg 752w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture3-300x103.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture3-205x70.jpg 205w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW110810920 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW110810920 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW110810920 BCX0\"><span class=\"TextRun SCXW110810920 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW110810920 BCX0\" data-ccp-parastyle=\"caption\">3<\/span><\/span><\/span><span class=\"TextRun SCXW110810920 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW110810920 BCX0\" data-ccp-parastyle=\"caption\">: CABINET in resource section<\/span><\/span><span class=\"EOP SCXW110810920 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Likewise, under RCDATA, there is another attribute called &#8220;RUNPROGRAM&#8221;, which starts cydn.exe.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"auto\">RUNPROGRAM in the resource section of a malware file typically refers to a resource that contains instructions for the malware to execute a specific program or command. When the malware is executed, it will load the resource containing the &#8220;RUNPROGRAM&#8221; command and attempt to execute the specified program or command. This technique is often used by malware authors to execute additional malicious programs or commands on the infected system. For example, the &#8220;RUNPROGRAM&#8221; resource may contains instructions to download and execute additional malware, or to launch a malicious script or command that can perform various malicious activities such as stealing sensitive data, creating backdoors, or disabling security software.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-168034 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture4.jpg\" alt=\"\" width=\"632\" height=\"227\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture4.jpg 632w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture4-300x108.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture4-205x74.jpg 205w\" sizes=\"auto, (max-width: 632px) 100vw, 632px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW70292947 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW70292947 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW70292947 BCX0\"><span class=\"TextRun SCXW70292947 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW70292947 BCX0\" data-ccp-parastyle=\"caption\">4<\/span><\/span><\/span><span class=\"TextRun SCXW70292947 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW70292947 BCX0\" data-ccp-parastyle=\"caption\">: RUNPROGRAM attribute <\/span><span class=\"NormalTextRun SCXW70292947 BCX0\" data-ccp-parastyle=\"caption\">stating<\/span><span class=\"NormalTextRun SCXW70292947 BCX0\" data-ccp-parastyle=\"caption\"> &#8220;cydn.exe&#8221;<\/span><\/span><span class=\"EOP SCXW70292947 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW24272088 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW24272088 BCX0\">Like <\/span><span class=\"NormalTextRun SCXW24272088 BCX0\">RUNPROGRAM, POSTRUNPROGRAM<\/span><span class=\"NormalTextRun SCXW24272088 BCX0\"> also holds the instruction to run the executable <\/span><span class=\"NormalTextRun SCXW24272088 BCX0\">after <\/span><span class=\"NormalTextRun SCXW24272088 BCX0\">RUNPROGRAM is executed. <\/span><span class=\"NormalTextRun SCXW24272088 BCX0\">Hence, once cydn.exe is executed, vona.exe will be executed.<\/span><\/span><span class=\"EOP SCXW24272088 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168048\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture5.jpg\" alt=\"\" width=\"546\" height=\"196\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture5.jpg 546w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture5-300x108.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture5-205x74.jpg 205w\" sizes=\"auto, (max-width: 546px) 100vw, 546px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW4221505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW4221505 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW4221505 BCX0\"><span class=\"TextRun SCXW4221505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW4221505 BCX0\" data-ccp-parastyle=\"caption\">5<\/span><\/span><\/span><span class=\"TextRun SCXW4221505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW4221505 BCX0\" data-ccp-parastyle=\"caption\">: POSTRUNPROGRAM stating &#8220;vona.exe&#8221;<\/span><\/span><span class=\"EOP SCXW4221505 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Once WEXTRACT.exe is executed, both cydn.exe and vona.exe is dropped in the TEMP folder. The TEMP folder is a commonly used location for malware to store temporary files and other data, as it is typically writable by any user account and is not usually subject to strict security restrictions. This can make it easier for the malware to operate without raising suspicion or triggering security alerts.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168062\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture6.jpg\" alt=\"\" width=\"715\" height=\"192\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture6.jpg 715w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture6-300x81.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture6-205x55.jpg 205w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW127544686 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW127544686 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW127544686 BCX0\"><span class=\"TextRun SCXW127544686 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW127544686 BCX0\" data-ccp-parastyle=\"caption\">6<\/span><\/span><\/span><span class=\"TextRun SCXW127544686 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW127544686 BCX0\" data-ccp-parastyle=\"caption\">: Files dropped in TEMP folder<\/span><\/span><span class=\"EOP SCXW127544686 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stage 2: Analysis of cydn.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The file showed high file ratio of the resource section, with the entropy of 7.810. Entropy is a measure of the randomness or unpredictability of the data in the file. It is often used as an indicator of whether a file is likely to be malicious or not.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the case of a PE file, high entropy can indicate that the file contains a significant amount of compressed or encrypted data, or that it has been obfuscated or packed in a way that makes it more difficult to analyze. This can be a common technique used by malware authors to evade detection by antivirus software.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168076\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture7.jpg\" alt=\"\" width=\"812\" height=\"182\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture7.jpg 812w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture7-300x67.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture7-768x172.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture7-205x46.jpg 205w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW172660107 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW172660107 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW172660107 BCX0\"><span class=\"TextRun SCXW172660107 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW172660107 BCX0\" data-ccp-parastyle=\"caption\">7<\/span><\/span><\/span><span class=\"TextRun SCXW172660107 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW172660107 BCX0\" data-ccp-parastyle=\"caption\">: File ratio and entropy of the resource section<\/span><\/span><span class=\"EOP SCXW172660107 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"> <span class=\"TextRun SCXW196659996 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">Like <\/span><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">the <\/span><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">previous<\/span> <span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">file<\/span><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">, cydn.exe also had two executables archived in its resource section, named aydx.exe and mika.exe. The &#8220;RUNPROGRAM&#8221; attribute commands to run aydx.exe and the &#8220;POSTRUNPROGRAM&#8221; attribute commands to execute mika.exe once aydx.exe is executed. These file<\/span><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">s<\/span><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\"> are <\/span><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">also <\/span><span class=\"NormalTextRun SCXW196659996 BCX0\" data-ccp-parastyle=\"Normal (Web)\">dropped in TEMP folder.<\/span><\/span><span class=\"EOP SCXW196659996 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168118\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture8-1.jpg\" alt=\"\" width=\"698\" height=\"130\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture8-1.jpg 650w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture8-1-300x56.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture8-1-205x38.jpg 205w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW214012460 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW214012460 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW214012460 BCX0\"><span class=\"TextRun SCXW214012460 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW214012460 BCX0\" data-ccp-parastyle=\"caption\">8<\/span><\/span><\/span><span class=\"TextRun SCXW214012460 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW214012460 BCX0\" data-ccp-parastyle=\"caption\">: aydx.exe and mika.exe packed in resource section<\/span><\/span><span class=\"EOP SCXW214012460 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168132\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture9-1.jpg\" alt=\"\" width=\"626\" height=\"148\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture9-1.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture9-1-300x71.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture9-1-205x48.jpg 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW31690389 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW31690389 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW31690389 BCX0\"><span class=\"TextRun SCXW31690389 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW31690389 BCX0\" data-ccp-parastyle=\"caption\">9<\/span><\/span><\/span><span class=\"TextRun SCXW31690389 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW31690389 BCX0\" data-ccp-parastyle=\"caption\">: Executables dropped in another TEMP folder<\/span><\/span><span class=\"EOP SCXW31690389 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW260325060 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW260325060 BCX0\" data-ccp-parastyle=\"Normal (Web)\">The order of file execution is as follows: First, Wextract.exe and cydn.exe, which have already been discussed, are followed by aydx.exe, and then by mika.exe and vona.exe<\/span><span class=\"NormalTextRun SCXW260325060 BCX0\" data-ccp-parastyle=\"Normal (Web)\">.<\/span><\/span><span class=\"EOP SCXW260325060 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168146\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture10.jpg\" alt=\"\" width=\"657\" height=\"306\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture10.jpg 657w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture10-300x140.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture10-205x95.jpg 205w\" sizes=\"auto, (max-width: 657px) 100vw, 657px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW78882040 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW78882040 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW78882040 BCX0\"><span class=\"TextRun SCXW78882040 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW78882040 BCX0\" data-ccp-parastyle=\"caption\">10<\/span><\/span><\/span><span class=\"TextRun SCXW78882040 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW78882040 BCX0\" data-ccp-parastyle=\"caption\">: Execution flow<\/span><\/span><span class=\"EOP SCXW78882040 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stage 3: Analysis of aydx.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Aydx.exe is a 32-bit Portable Executable file, which is 405Kb and is compiled in C\/C++. Once executed, it attempts to make a request to IP address:\u202f<\/span><b><span data-contrast=\"auto\">193.233.20.7<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168160\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture11.jpg\" alt=\"\" width=\"753\" height=\"124\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture11.jpg 650w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture11-300x49.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture11-205x34.jpg 205w\" sizes=\"auto, (max-width: 753px) 100vw, 753px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW170224257 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW170224257 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW170224257 BCX0\"><span class=\"TextRun SCXW170224257 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW170224257 BCX0\" data-ccp-parastyle=\"caption\">11<\/span><\/span><\/span><span class=\"TextRun SCXW170224257 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW170224257 BCX0\" data-ccp-parastyle=\"caption\">: Malware trying to connect to IPv4<\/span><\/span><span class=\"EOP SCXW170224257 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This IP address is linked with\u202f<\/span><b><i><span data-contrast=\"auto\">Redline Stealer<\/span><\/i><\/b><span data-contrast=\"auto\"> connecting on port number 4138.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"auto\">Analysis of mika.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mika.exe is 32-bit Portable Executable, complied in .NET and is just 11 KB in size. The original name of the file is &#8220;Healer.exe&#8221;. This exe file makes no internet activity but does something in the target machine which assists malwares from further stages to carry out their execution.\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The intent of mika.exe is to turn off Windows Defender in all possible ways. Once mika.exe was executed, this is how the Defender settings of the system looked like:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168174\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture12.jpg\" alt=\"\" width=\"380\" height=\"233\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture12.jpg 326w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture12-300x184.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture12-205x126.jpg 205w\" sizes=\"auto, (max-width: 380px) 100vw, 380px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW207232342 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW207232342 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW207232342 BCX0\"><span class=\"TextRun SCXW207232342 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW207232342 BCX0\" data-ccp-parastyle=\"caption\">12<\/span><\/span><\/span><span class=\"TextRun SCXW207232342 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW207232342 BCX0\" data-ccp-parastyle=\"caption\">: Real-time protection turned off<\/span><\/span><span class=\"EOP SCXW207232342 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW127137777 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW127137777 BCX0\" data-ccp-parastyle=\"Normal (Web)\">This setting was irreversible and <\/span><span class=\"NormalTextRun SCXW127137777 BCX0\" data-ccp-parastyle=\"Normal (Web)\">couldn&#8217;t<\/span><span class=\"NormalTextRun SCXW127137777 BCX0\" data-ccp-parastyle=\"Normal (Web)\"> be turned back to on via settings of Windows. Following this, logs from <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW127137777 BCX0\" data-ccp-parastyle=\"Normal (Web)\">Procmon<\/span><span class=\"NormalTextRun SCXW127137777 BCX0\" data-ccp-parastyle=\"Normal (Web)\"> were analyzed and there were entries <\/span><span class=\"NormalTextRun SCXW127137777 BCX0\" data-ccp-parastyle=\"Normal (Web)\">regarding<\/span><span class=\"NormalTextRun SCXW127137777 BCX0\" data-ccp-parastyle=\"Normal (Web)\"> Windows defender, such as:<\/span><\/span><span class=\"EOP SCXW127137777 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168188\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture13.jpg\" alt=\"\" width=\"782\" height=\"712\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture13.jpg 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture13-300x273.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture13-768x699.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture13-142x129.jpg 142w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW173335970 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW173335970 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW173335970 BCX0\"><span class=\"TextRun SCXW173335970 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW173335970 BCX0\" data-ccp-parastyle=\"caption\">13<\/span><\/span><\/span><span class=\"TextRun SCXW173335970 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW173335970 BCX0\" data-ccp-parastyle=\"caption\">: <\/span><span class=\"NormalTextRun SCXW173335970 BCX0\" data-ccp-parastyle=\"caption\">Procmon<\/span><span class=\"NormalTextRun SCXW173335970 BCX0\" data-ccp-parastyle=\"caption\"> logs<\/span><\/span><span class=\"EOP SCXW173335970 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To validate this, Registry was analysed and all the changes were found there. The changes in Registry were found to be in exact order as of Procmon logs. In Windows, the registry is a hierarchical database that stores configuration settings and options for the operating system, as well as for applications and devices. It is used to store information about the hardware, software, user preferences, and system settings on a Windows computer. Following keys are added under Real-Time Protection:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">DisableBehaviourMonitoring<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">DisableIOAVProtection<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">DisableOnAccessProtection<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">DisableRealtimeMonitoring<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">DisableScanOnRealitimeEnable<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168202\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture14.jpg\" alt=\"\" width=\"764\" height=\"243\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture14.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture14-300x95.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture14-205x65.jpg 205w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW220232735 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW220232735 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW220232735 BCX0\"><span class=\"TextRun SCXW220232735 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW220232735 BCX0\" data-ccp-parastyle=\"caption\">14<\/span><\/span><\/span><span class=\"TextRun SCXW220232735 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW220232735 BCX0\" data-ccp-parastyle=\"caption\">: Keys added in Registry<\/span><\/span><span class=\"EOP SCXW220232735 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">By doing so malware is restricting all the normal users from turning the Windows Defender on. When attackers disable Windows Defender through the registry, the change is likely to persist even if the user or administrator tries to re-enable it through the Windows Defender settings. This allows the attacker to maintain control over the system for a longer period. This supports malwares of further stages to easily execute themselves without any hinderances. This can be leveraged by all the malwares, regardless of their correspondence to this very campaign.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stage 4: Analysis of vona.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Vona.exe, a variant of the Amadey malware family, is compiled in C\/C++ and is 236 KB in size. This is the last file to be executed from the current cluster.\u202f When executed, a highly extensive process tree quickly appeared.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168216\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture15.jpg\" alt=\"\" width=\"491\" height=\"1111\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture15.jpg 491w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture15-133x300.jpg 133w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture15-453x1024.jpg 453w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture15-57x129.jpg 57w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW265712728 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW265712728 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW265712728 BCX0\"><span class=\"TextRun SCXW265712728 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW265712728 BCX0\" data-ccp-parastyle=\"caption\">15<\/span><\/span><\/span><span class=\"TextRun SCXW265712728 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW265712728 BCX0\" data-ccp-parastyle=\"caption\">: Process tree of vona.exe<\/span><\/span><span class=\"EOP SCXW265712728 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stage 5: Analysis of mnolyk.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">An immediate child process of vona.exe is mnolyk.exe, another Amadey component, is dropped in a folder in TEMP folder.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168230\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture16.jpg\" alt=\"\" width=\"526\" height=\"132\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture16.jpg 526w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture16-300x75.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture16-205x51.jpg 205w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW253461090 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW253461090 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW253461090 BCX0\"><span class=\"TextRun SCXW253461090 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW253461090 BCX0\" data-ccp-parastyle=\"caption\">16<\/span><\/span><\/span><span class=\"TextRun SCXW253461090 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW253461090 BCX0\" data-ccp-parastyle=\"caption\">: mnolyk.exe dropped in TEMP folder<\/span><\/span><span class=\"EOP SCXW253461090 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mnolyk.exe makes active connections to IP addresses\u202f<\/span><b><span data-contrast=\"auto\">62.204.41.5<\/span><\/b><span data-contrast=\"auto\">\u202fand\u202f<\/span><b><span data-contrast=\"auto\">62.204.41.251<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Malicious DLLs are downloaded from 62.204.41.5, which are executed later in the campaign. The target was made to search for two different DLLs, namely cred.dll and clip.dll.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168244\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture17.jpg\" alt=\"\" width=\"589\" height=\"540\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture17.jpg 589w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture17-300x275.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture17-141x129.jpg 141w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW103028185 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW103028185 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW103028185 BCX0\"><span class=\"TextRun SCXW103028185 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW103028185 BCX0\" data-ccp-parastyle=\"caption\">17<\/span><\/span><\/span><span class=\"TextRun SCXW103028185 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW103028185 BCX0\" data-ccp-parastyle=\"caption\">: Malicious <\/span><span class=\"NormalTextRun SCXW103028185 BCX0\" data-ccp-parastyle=\"caption\">dlls<\/span><span class=\"NormalTextRun SCXW103028185 BCX0\" data-ccp-parastyle=\"caption\"> downloaded<\/span><\/span><span class=\"EOP SCXW103028185 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW72962146 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW72962146 BCX0\" data-ccp-parastyle=\"Normal (Web)\">From 62.204.41.251, various exe files are downloaded <\/span><span class=\"NormalTextRun SCXW72962146 BCX0\" data-ccp-parastyle=\"Normal (Web)\">to<\/span> <span class=\"NormalTextRun SCXW72962146 BCX0\" data-ccp-parastyle=\"Normal (Web)\">the TEMP folder, and later executed. Exes downloaded are:<\/span><\/span><span class=\"EOP SCXW72962146 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW70115480 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW70115480 BCX0\">fuka.exe<\/span><\/span><span class=\"EOP SCXW70115480 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168356\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture18.jpg\" alt=\"\" width=\"665\" height=\"85\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture18.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture18-300x38.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture18-205x26.jpg 205w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW10422764 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW10422764 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW10422764 BCX0\"><span class=\"TextRun SCXW10422764 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW10422764 BCX0\" data-ccp-parastyle=\"caption\">18<\/span><\/span><\/span><span class=\"TextRun SCXW10422764 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW10422764 BCX0\" data-ccp-parastyle=\"caption\">: fuka.exe<\/span><\/span><span class=\"EOP SCXW10422764 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW88491971 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW88491971 BCX0\">nikas.exe<\/span><\/span><span class=\"EOP SCXW88491971 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168370\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture19.jpg\" alt=\"\" width=\"651\" height=\"78\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture19.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture19-300x36.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture19-205x25.jpg 205w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW150319333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW150319333 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW150319333 BCX0\"><span class=\"TextRun SCXW150319333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW150319333 BCX0\" data-ccp-parastyle=\"caption\">19<\/span><\/span><\/span><span class=\"TextRun SCXW150319333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW150319333 BCX0\" data-ccp-parastyle=\"caption\">: nikas.exe<\/span><\/span><span class=\"EOP SCXW150319333 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW178005226 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW178005226 BCX0\">igla.exe<\/span><\/span><span class=\"EOP SCXW178005226 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168384\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture20.jpg\" alt=\"\" width=\"661\" height=\"76\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture20.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture20-300x35.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture20-205x24.jpg 205w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW89249864 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89249864 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW89249864 BCX0\"><span class=\"TextRun SCXW89249864 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89249864 BCX0\" data-ccp-parastyle=\"caption\">20<\/span><\/span><\/span><span class=\"TextRun SCXW89249864 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW89249864 BCX0\" data-ccp-parastyle=\"caption\">: igla.exe<\/span><\/span><span class=\"EOP SCXW89249864 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>nocr.exe<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168398\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture21.jpg\" alt=\"\" width=\"626\" height=\"82\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture21.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture21-300x39.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture21-205x27.jpg 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW209767375 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW209767375 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW209767375 BCX0\"><span class=\"TextRun SCXW209767375 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW209767375 BCX0\" data-ccp-parastyle=\"caption\">21<\/span><\/span><\/span><span class=\"TextRun SCXW209767375 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW209767375 BCX0\" data-ccp-parastyle=\"caption\">: nocr.exe<\/span><\/span><span class=\"EOP SCXW209767375 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>lebro.exe<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-168412 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture22.jpg\" alt=\"\" width=\"626\" height=\"80\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture22.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture22-300x38.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture22-205x26.jpg 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW254191570 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW254191570 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW254191570 BCX0\"><span class=\"TextRun SCXW254191570 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW254191570 BCX0\" data-ccp-parastyle=\"caption\">22<\/span><\/span><\/span><span class=\"TextRun SCXW254191570 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW254191570 BCX0\" data-ccp-parastyle=\"caption\">: lebro.exe<\/span><\/span><span class=\"EOP SCXW254191570 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Following the execution of mnolyk.exe, a series of schtasks.exe and cacls.exe were executed.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The command line for schtasks.exe is <\/span><i><span data-contrast=\"auto\">&#8220;C:\\Windows\\System32\\schtasks.exe&#8221; \/Create \/SC MINUTE \/MO 1 \/TN mnolyk.exe \/TR &#8220;C:\\Users\\test\\AppData\\Local\\Temp\\5eb6b96734\\mnolyk.exe&#8221; \/F<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;\/Create&#8221; &#8211; This is the command to create a new scheduled task.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;\/SC MINUTE&#8221; &#8211; This parameter sets the scheduling interval for the task to &#8220;MINUTE&#8221;. The task will run every minute.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;\/MO 1&#8221; &#8211; This parameter sets the repeat count to &#8220;1&#8221;. The task will run only once.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;\/TN&#8221; &#8211; This parameter specifies the name of the task. The name should be specified after the &#8220;\/TN&#8221; parameter.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">So, the entire command line &#8220;schtasks.exe \/Create \/SC MINUTE \/MO 1 \/TN&#8221; would create a scheduled task that runs once every minute. The name of the task specified is the path to mnolyk.exe.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There were several instances of cacls.exe created. One of them is explained here along with its parameter. The command line is <\/span><i><span data-contrast=\"auto\">&#8220;CACLS \u202f&#8221;mnolyk.exe&#8221; \/P &#8220;test:R&#8221; \/E&#8221;<\/span><\/i><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;CACLS&#8221; &#8211; This is the command to change the ACL of a file.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;mnolyk.exe&#8221; &#8211; This is the file for which the ACL will be modified.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;\/P test:R&#8221; &#8211; This parameter specifies the permission change for a user named &#8220;test&#8221;. The &#8220;:R&#8221; at the end indicates that the &#8220;test&#8221; user will be granted &#8220;Read&#8221; permission.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">&#8220;\/E&#8221; &#8211; This parameter specifies that the ACL change will be made to the file&#8217;s effective ACL. The effective ACL is the actual set of permissions that are applied to the file.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">So, the entire command line &#8220;CACLS mnolyk.exe \/P test:R \/E&#8221; would grant the &#8220;test&#8221; user or group &#8220;Read&#8221; permission to the &#8220;mnolyk.exe&#8221; file. Hence the user &#8220;test&#8221; can neither write nor delete this file. If in place of &#8220;\/P test:R&#8221;, &#8220;\/P test:N&#8221; was mentioned, which is mentioned in one of the command line, it would give &#8220;None&#8221; permission to the user.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stage 6: Analyzing fuka.exe, nikas.exe, igla.exe, nocr.exe and lebro.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p aria-level=\"3\"><b><span data-contrast=\"auto\">Fuka.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Fukka.exe, a variant of the Redline Stealer malware family, is 175 KB and is compiled in .NET. The original name of the file is Samarium.exe. It shows some network activity with IP\u202f<\/span><b><i><span data-contrast=\"auto\">193.233.20.11.<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168342\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture23.jpg\" alt=\"\" width=\"626\" height=\"92\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture23.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture23-300x44.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture23-205x30.jpg 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW11364257 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW11364257 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW11364257 BCX0\"><span class=\"TextRun SCXW11364257 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW11364257 BCX0\" data-ccp-parastyle=\"caption\">23<\/span><\/span><\/span><span class=\"TextRun SCXW11364257 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW11364257 BCX0\" data-ccp-parastyle=\"caption\">: Network activity of fuka.exe<\/span><\/span><span class=\"EOP SCXW11364257 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"auto\">Nikas.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Nikas.exe is 248 KB executable file compiled in C\/C++. It disables automatic updates for Windows and checks the status of all the sub-fields of Real-Time Protection that were previously changed by mika.exe. No network activity was found during replication.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"auto\">Igla.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Igla.exe is 520 KB file, compiled in C\/C++. The original name of the file is WEXTRACT.EXE.MUI. Like we saw in cydn.exe, this PE has also two more exes packed in its resource section, bvPf.exe and cmkmka.exe. Once igla.exe is executed, bvPf.exe is executed, followed by cmkmka.exe.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168314\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture24.jpg\" alt=\"\" width=\"682\" height=\"195\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture24.jpg 682w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture24-300x86.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture24-205x59.jpg 205w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW101412821 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW101412821 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW101412821 BCX0\"><span class=\"TextRun SCXW101412821 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW101412821 BCX0\" data-ccp-parastyle=\"caption\">24<\/span><\/span><\/span><span class=\"TextRun SCXW101412821 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW101412821 BCX0\" data-ccp-parastyle=\"caption\">: RUNPROGRAM attribute in igla.exe<\/span><\/span><span class=\"EOP SCXW101412821 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168328\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture25.jpg\" alt=\"\" width=\"782\" height=\"194\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture25.jpg 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture25-300x74.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture25-768x191.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture25-205x51.jpg 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW190463906 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW190463906 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW190463906 BCX0\"><span class=\"TextRun SCXW190463906 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW190463906 BCX0\" data-ccp-parastyle=\"caption\">25<\/span><\/span><\/span><span class=\"TextRun SCXW190463906 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW190463906 BCX0\" data-ccp-parastyle=\"caption\">: POSTRUNPROGRAM attribute <\/span><span class=\"NormalTextRun SCXW190463906 BCX0\" data-ccp-parastyle=\"caption\">in<\/span><span class=\"NormalTextRun SCXW190463906 BCX0\" data-ccp-parastyle=\"caption\"> igla.exe<\/span><\/span><span class=\"EOP SCXW190463906 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p aria-level=\"4\"><b><span data-contrast=\"auto\">bvPf.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:300,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">bvPf.exe is 306 KB in size and is compiled in C\/C++.\u202f The original filename is nightskywalker.exe. The file is dropped in a folder in TEMP folder of the system.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The exe has tried connecting to 193.233.20.11, but server did not respond, and no communication took place.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"4\"><b><span data-contrast=\"auto\">cmkmka.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:300,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">cmkmka.exe is 32-bit PE file, 283.5 KB in size. It further launches AppLaunch.exe which communicates to C2.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It communicates to the IP address:\u202f<\/span><b><i><span data-contrast=\"auto\">176.113.115.17\u202f<\/span><\/i><\/b><span data-contrast=\"auto\">which is an active C2 for\u202f<\/span><b><span data-contrast=\"auto\">Redline Stealer<\/span><\/b><span data-contrast=\"auto\"> and connects to the port 4132.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168300\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture26.jpg\" alt=\"\" width=\"675\" height=\"429\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture26.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture26-300x191.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture26-203x129.jpg 203w\" sizes=\"auto, (max-width: 675px) 100vw, 675px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW110467488 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW110467488 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW110467488 BCX0\"><span class=\"TextRun SCXW110467488 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW110467488 BCX0\" data-ccp-parastyle=\"caption\">26<\/span><\/span><\/span><span class=\"TextRun SCXW110467488 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW110467488 BCX0\" data-ccp-parastyle=\"caption\">: Data exfiltration<\/span><\/span><span class=\"EOP SCXW110467488 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">The blue-colored content in the data indicates the information being transmitted from the Command and Control (C2) server, which is providing instructions to the malware regarding the specific data that needs to be retrieved along with their corresponding paths. These paths include user profiles of different web browsers, various crypto wallet paths, and other related data.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a response, all the data residing at the specified paths is sent back to the C2 server of the malware. This includes all the profiles of different web browsers, information related to crypto wallets, and even user-related data from the Windows operating system. This process allows the C2 server to collect a vast amount of sensitive information from the infected system, which could be exploited by the attackers for malicious purposes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"auto\">Nocr.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Nocr.exe, a component of Redline Stealer, is a 175 KB .NET binary. The original name of the file is Alary.exe.\u00a0 It communicates to the IP address\u202f<\/span><b><i><span data-contrast=\"auto\">176.113.115.17.<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"auto\">Lebro.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Lebro.exe, a component of Amadey, is a 235 KB file, compiled in C\/C++. Lebro.exe is responsible for executing nbveek.exe, which is a next stage of the malware. The file is again dropped in TEMP folder.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168286\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture27.jpg\" alt=\"\" width=\"626\" height=\"138\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture27.jpg 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture27-300x66.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture27-205x45.jpg 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW156654349 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW156654349 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW156654349 BCX0\"><span class=\"TextRun SCXW156654349 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW156654349 BCX0\" data-ccp-parastyle=\"caption\">27<\/span><\/span><\/span><span class=\"TextRun SCXW156654349 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW156654349 BCX0\" data-ccp-parastyle=\"caption\">: Dropping another executable in TEMP folder<\/span><\/span><span class=\"EOP SCXW156654349 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stage 7: Analyzing nbveek.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The hashes of lebro.exe and nbveek.exe are same, they are the same binaries, hence it is\u202f<\/span><b><span data-contrast=\"auto\">Amadey<\/span><\/b><span data-contrast=\"auto\">. It is connecting to IP\u202f<\/span><b><i><span data-contrast=\"auto\">62.204.41.88.\u202f<\/span><\/i><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-168272\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture28.jpg\" alt=\"\" width=\"812\" height=\"251\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture28.jpg 812w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture28-300x93.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture28-768x237.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture28-205x63.jpg 205w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW52494595 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW52494595 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW52494595 BCX0\"><span class=\"TextRun SCXW52494595 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW52494595 BCX0\" data-ccp-parastyle=\"caption\">28<\/span><\/span><\/span><span class=\"TextRun SCXW52494595 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW52494595 BCX0\" data-ccp-parastyle=\"caption\">: Network activity of nbveek.exe<\/span><\/span><span class=\"EOP SCXW52494595 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">The target system executes a php file, and the content of file includes the command to download another exe called setupff.exe. This exe is downloaded to the TEMP folder.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Before setupff.exe is executed, again the series of schtasks.exe and cacls.exe are executed which were seen previously also. The same parameters were passed for nbveek.exe as they were for mnolyk.exe.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"auto\">Setupff.exe<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Setupff.exe is compiled in C\/C++ and is 795 KB.\u202f The file could not execute and threw Windows error.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stage 8: Final stage<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:450,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Later, another instance of setupff.exe was created which further invokes multiple instances of rundll32.exe. Here, the two dlls downloaded by mnolyk.exe, clip64.dll and cred64.dll, are executed through rundll32.exe. McAfee Labs detects these dlls to be Amadey maware.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The network activity shows the dll to be connecting to <\/span><b><i><span data-contrast=\"auto\">62.204.41.88<\/span><\/i><\/b><span data-contrast=\"auto\">. This dll again starts exfiltrating data to C2:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:150,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-168258\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture29.jpg\" alt=\"\" width=\"469\" height=\"455\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture29.jpg 426w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture29-300x291.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture29-133x129.jpg 133w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture29-24x24.jpg 24w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/Picture29-48x48.jpg 48w\" sizes=\"auto, (max-width: 469px) 100vw, 469px\" \/><\/p>\n<p style=\"text-align: center;\"><span class=\"TextRun SCXW151835066 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW151835066 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW151835066 BCX0\"><span class=\"TextRun SCXW151835066 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW151835066 BCX0\" data-ccp-parastyle=\"caption\">29<\/span><\/span><\/span><span class=\"TextRun SCXW151835066 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW151835066 BCX0\" data-ccp-parastyle=\"caption\">:<\/span><span class=\"NormalTextRun SCXW151835066 BCX0\" data-ccp-parastyle=\"caption\">Data exfiltration<\/span><\/span><span class=\"EOP SCXW151835066 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">To conclude, the threat posed by the multi-stage attack that drops the Amadey botnet, and subsequently Redline Stealer, is significant and requires constant vigilance from both consumers and security professionals. By using the Amadey botnet as a delivery mechanism for other malware, attackers can leverage these same capabilities to evade detection and maintain persistence on infected computers. They can use Amadey to drop a wide range of malware, such as spyware, ransomware, and trojans, which can be used for a variety of malicious purposes, such as stealing sensitive information, encrypting files for ransom, or taking control of a computer for use in a larger botnet. Our analysis of various samples of this attack has revealed that the Amadey botnet distributes malware from multiple families and is not restricted to Redline Stealer alone.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At McAfee, we are committed to providing our customers with robust and effective antivirus and anti-malware solutions that can detect and protect against threats like the Amadey botnet and other malware families. Our security software uses a combination of signature, machine learning, threat intelligence and behavioral-based detection techniques to identify and stop threats before they can cause damage.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Indicators of Compromise (IOCs):<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h2>\n<table data-tablestyle=\"MsoNormalTable\" data-tablelook=\"1184\" aria-rowcount=\"24\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"69905\"><b><i><span data-contrast=\"auto\">File Type<\/span><\/i><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:241,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><b><i><span data-contrast=\"auto\">SHA-256<\/span><\/i><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:241,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><b><i><span data-contrast=\"auto\">Product<\/span><\/i><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:241,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><b><i><span data-contrast=\"auto\">Detection<\/span><\/i><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:241,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">80fed7cd4c7d7cb0c05fe128ced6ab2b9b3d7f03edcf5ef532c8236f00ee7376<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Downloader-FCND<\/span><br \/>\n<span data-contrast=\"auto\">Lockbit-FSWW<\/span><br \/>\n<span data-contrast=\"auto\">PWS-FDON<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">d8e9b2d3afd0eab91f94e1a1a1a0a97aa2974225f4f086a66e76dbf4b705a800<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">PWS-FDON<\/span><br \/>\n<span data-contrast=\"auto\">Lockbit-FSWW<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">1d51e0964268b35afb43320513ad9837ec6b1c0bd0e56065ead5d99b385967b5<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Lockbit-FSWW<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">PWS-FDON<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Downloader-FCND<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"7\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Downloader-FCND<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"8\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">8020580744f6861a611e99ba17e92751499e4b0f013d66a103fb38c5f256bbb2<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">AgentTesla-FCYU<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"9\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">021ae2fadbc8bc4e83013de03902e6e97c2815ab821adaa58037e562a6b2357b<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Lockbit-FSWW<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"10\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">aab1460440bee10e2efec9b5c83ea20ed85e7a17d4ed3b4a19341148255d54b1<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Lockbit-FSWW<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"11\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">54ce28a037eea87448e65bc25f8d3a38ddd4b4679516cc59899b77150aa46fcc<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">GenericRXVK-HF<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"12\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">AgentTesla-FCYU<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"13\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Downloader-FCND<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"14\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">ad1d5475d737c09e3c48f7996cd407c992c1bb5601bcc6c6287eb80cde3d852b<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Downloader-FCND<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"15\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.exe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">d40d2bfa9fcbf980f76ce224ab6037ebd2b081cb518fa65b8e208f84bc155e41<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">GenericRXVJ-QP<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"16\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.dll<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">cdd4072239d8a62bf134e9884ef2829d831efaf3f6f7f71b7266af29df145dd0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">PWS-FDOE<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"17\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.dll<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">10ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Trojan-FUUW<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"18\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">.dll<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">3492ed949b0d1cbd720eae940d122d6a791df098506c24517da0cc149089f405<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Total Protection and LiveSafe<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">Trojan-FUUW<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"19\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">IPv4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">193.233.20.7<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"20\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">IPv4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">62.204.41.5<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"21\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">IPv4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">62.204.41.251<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"22\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">IPv4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">193.233.20.11<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"23\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">IPv4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">176.113.115.17<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"24\">\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">IPv4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">62.204.41.88<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<td data-celllook=\"69905\"><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559731&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559797&quot;:100}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by By Yashvi Shah\u00a0 McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at&#8230;<\/p>\n","protected":false},"author":695,"featured_media":169232,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-167990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deconstructing Amadey&#039;s Latest Multi-Stage Attack and Malware Distribution | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by By Yashvi Shah\u00a0 McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at multiple stages. \u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deconstructing Amadey&#039;s Latest Multi-Stage Attack and Malware Distribution | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by By Yashvi Shah\u00a0 McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at multiple stages. \u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-05T21:30:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-11T18:05:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Deconstructing Amadey&#8217;s Latest Multi-Stage Attack and Malware Distribution\",\"datePublished\":\"2023-05-05T21:30:10+00:00\",\"dateModified\":\"2023-07-11T18:05:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/\"},\"wordCount\":3224,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/\",\"name\":\"Deconstructing Amadey's Latest Multi-Stage Attack and Malware Distribution | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png\",\"datePublished\":\"2023-05-05T21:30:10+00:00\",\"dateModified\":\"2023-07-11T18:05:31+00:00\",\"description\":\"Authored by By Yashvi Shah\u00a0 McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at multiple stages. \u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Deconstructing Amadey&#8217;s Latest Multi-Stage Attack and Malware Distribution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deconstructing Amadey's Latest Multi-Stage Attack and Malware Distribution | McAfee Blog","description":"Authored by By Yashvi Shah\u00a0 McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at multiple stages. \u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Deconstructing Amadey's Latest Multi-Stage Attack and Malware Distribution | McAfee Blog","og_description":"Authored by By Yashvi Shah\u00a0 McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at multiple stages. \u00a0","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-05-05T21:30:10+00:00","article_modified_time":"2023-07-11T18:05:31+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Deconstructing Amadey&#8217;s Latest Multi-Stage Attack and Malware Distribution","datePublished":"2023-05-05T21:30:10+00:00","dateModified":"2023-07-11T18:05:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/"},"wordCount":3224,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/","name":"Deconstructing Amadey's Latest Multi-Stage Attack and Malware Distribution | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png","datePublished":"2023-05-05T21:30:10+00:00","dateModified":"2023-07-11T18:05:31+00:00","description":"Authored by By Yashvi Shah\u00a0 McAfee Labs have identified an increase in Wextract.exe samples, that drop a malware payload at multiple stages. \u00a0","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/05\/300x200_Blog_Amadey-Malware.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/deconstructing-amadeys-latest-multi-stage-attack-and-malware-distribution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Deconstructing Amadey&#8217;s Latest Multi-Stage Attack and Malware Distribution"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=167990"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167990\/revisions"}],"predecessor-version":[{"id":171476,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/167990\/revisions\/171476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/169232"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=167990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=167990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=167990"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=167990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}