Oneetx.exe is a malicious process, related to Amadey dropper malware. It can be spectated in the Task Manager, with seemingly nothing suspicious about it – if you don’t know what it stands for. Let me show you how it appears and how you can remove it.
What is Oneetx.exe process?
Oneetx.exe is a disguised name chosen by Amadey dropper developers to hide their malware among other processes. Windows tracks all processes running in the system and displays what it found in Task Manager. Obviously, obfuscated names like sv39103.exe will attract attention and raise suspicion. That is the reason why hackers opt for some ordinary names. Their often choice is system processes or ones related to popular software packages, like Photoshop or crypto mining software. This case, however, is different.
It appears that oneetx.exe does not belong to any program. Moreover, Google contains clear clues that this process belongs to malware that has acted as a backbone of the Russian botnet since 2018. The most obvious guess is, of course, Emotet malware. It is known for having possibly the most extensive networks on the planet. However, in this case, the short research showed the relation of oneetx.exe to the Amadey dropper.
What is Amadey?
Amadey is a dropper (a.k.a downloader) malware, that has only one purpose – deliver other malware to the infected system. It often acts as a precursor, that makes sure the system is not in a banned region and is not a debug environment. It can deliver a wide range of threats – from the aforementioned Emotet to RedLine stealer and even STOP/Djvu ransomware. Even after delivering the payload, it remains active, waiting for other commands from hackers.
Aimed at long-term stay in the system, Amadey does its best in hiding from users and anti-malware software. Choosing an unremarkable name is only a small part of the way it disguises itself. First of all, each of its samples is repacked in a specific way, making it harder for antiviruses to detect. Amadey typically arrives within phishing emails with attached Office documents. Upon execution, malware moves its files from the original directory to the other folder, depending on the antivirus software present in the system. All these actions make it a pretty tough nut for “classic” antiviruses.
IoC Amadey Dropper
- Trojan.Win32.Amadey.bot: d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
- Trojan.Win32.Amadey.bot: 362d8f8fcc698554a750a5dfb1e261eb3b5442fb4bfe4746c8ba9431ec944305
- Trojan.Win32.Amadey.bot: 4496c76b89febda6091e6427c08fd88dcb7d97df60d9406e06b01c38e0cd7db4
- Trojan.Win32.Amadey.bot: 536980bcf6e3edcac4c0c293a1dd0a1a49c27db1fc4539e86923f278ed603cc6
- Trojan.Win32.Amadey.bot: d8076ef5647c95dd39b2add05950119f7e0f004baea9314da7b0084527225aa7
- Trojan.Win32.Amadey.bot: ad8b49621e35dd571c0d887af8c026f64b74b48ec1584e64844f83de023b6e96
- Trojan.Win32.Amadey.bot: 89514d80ee5134e867e90052275abdd3e78cd50bf3c593784c73ef3f95cb94b7
- Trojan.Win32.Amadey.bot: e08085f8aca8a5c305279a9acd498ccad799dd8f02ec8b68eea50cb14ac70d97
- Trojan.Win32.Amadey.bot: a3c341fdeeaa3c8d1462042aef68f99c75c5c301bab46b0d6973db1fc905918c
- Trojan.U.Amadey.bot: 75477f9a9d3fce379108c89395266eb9958a24eabb1edbeaabc860f82507e111
How to remove Oneetx.exe?
You will likely fail to remove Oneetx.exe from your system manually. It performs a row of actions for persistence provision, which forces the user to locate and remove all the changes it does to the system before touching the files. For that reason, I’d recommend using GridinSoft Anti-Malware – a program that specialises in removing threats like Amadey dropper.
The program will not only help you with removing this malware, but also prevent any further infections. Its detection system makes it effective even against the newest tricks – regardless of the way they’re packed. However, anti-malware software should be your last line of defense. To stay secure, it is better to avoid any muddy waters at all. In the case of Amadey malware, the key is to be vigilant when you deal with email messages. Read our detailed analysis of modern spam emails and the way to recognise them.