General

  • Target

    rween.exe

  • Size

    313KB

  • Sample

    210419-kr4ndywd5n

  • MD5

    1994c7dd431c88e7b71bfeec3f51d493

  • SHA1

    6c151e09cf1ef8db8c19aee22f22f1686cf77288

  • SHA256

    afe81576e019af203a3b4548dcebe0ed5f9719719821fe570ef6eb31cae6cd0b

  • SHA512

    36f4cb0c5f78645c948ba2f2445b23bcc836ebf083e628b25360954bb30d6baa074087535906192d561004b5b008b0e519301a8eb3e313fec6c282b62d0b32d3

Malware Config

Extracted

Family

amadey

Version

2.11

C2

176.111.174.67/7Ndd3SnW/index.php

Targets

    • Target

      rween.exe

    • Size

      313KB

    • MD5

      1994c7dd431c88e7b71bfeec3f51d493

    • SHA1

      6c151e09cf1ef8db8c19aee22f22f1686cf77288

    • SHA256

      afe81576e019af203a3b4548dcebe0ed5f9719719821fe570ef6eb31cae6cd0b

    • SHA512

      36f4cb0c5f78645c948ba2f2445b23bcc836ebf083e628b25360954bb30d6baa074087535906192d561004b5b008b0e519301a8eb3e313fec6c282b62d0b32d3

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks