NVIDIA Merlin Flaw Enables Remote Code Execution as Root
September 25, 2025Rhadamanthys Stealer – Active IOCs
September 25, 2025NVIDIA Merlin Flaw Enables Remote Code Execution as Root
September 25, 2025Rhadamanthys Stealer – Active IOCs
September 25, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
8fcc48aa1a54be5c56e80c557ed0e0bf
70a2edd73fa11af765940818957f12ca
9102711022a0581524ae9809afa7449c
SHA-256
6e47c7da236b409d14f47a29913d778d2ba5f362be45b36ca5c44ca6514948fb
19ef4402c0c3258223747bfe264d4462b39406a08d4d41a9bc4f5d2f1283a85c
031b9eb1e99f861093d0ba2c5636ffb5f2c0f6e3d041a0bab7ce77c44ce495e9
SHA-1
2091f89966077534384cd79986aea8ce19cb67f1
ff437d399f42ec869b9905d0acc24c044ba89e6f
34bff709b811a0b2c93b9264d86fc4686e51904d
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.