General

  • Target

    xsrv2.exe

  • Size

    277KB

  • Sample

    210501-t8cpy5nees

  • MD5

    6ee6360780735d4be90b6eb64df15a56

  • SHA1

    74b8352d724cf8757f646042cbc3e9339e09c193

  • SHA256

    c14ea29de50a8295487fea090d9313dfff27bd3c30b67b82e5d2634dc30ce738

  • SHA512

    e981609af406bb73943ec0fff88ad2833d6d3037527e1d1e988cf213b5ca6929180e2ae5421b7c631b63d5629cf01a699c0b701124b75fbf76a9de7500b59d36

Malware Config

Extracted

Family

amadey

Version

2.16

C2

176.111.174.114/Hnq8vS/index.php

Targets

    • Target

      xsrv2.exe

    • Size

      277KB

    • MD5

      6ee6360780735d4be90b6eb64df15a56

    • SHA1

      74b8352d724cf8757f646042cbc3e9339e09c193

    • SHA256

      c14ea29de50a8295487fea090d9313dfff27bd3c30b67b82e5d2634dc30ce738

    • SHA512

      e981609af406bb73943ec0fff88ad2833d6d3037527e1d1e988cf213b5ca6929180e2ae5421b7c631b63d5629cf01a699c0b701124b75fbf76a9de7500b59d36

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks