General

  • Target

    7B030FD1473BD9B213A6DA3EF3ADC19E.exe

  • Size

    2.0MB

  • Sample

    210507-rwm2q8jm5a

  • MD5

    7b030fd1473bd9b213a6da3ef3adc19e

  • SHA1

    3fd6debb83d6b9b6240408fecef9946163d5a493

  • SHA256

    07eaa6e88904f46157a5e5e45dd70d6e14d5d06aae7dc17e8a2c440ff403a51e

  • SHA512

    833cf86b707836347fca8750ef0abf8d7e6f5ce56ef4dacdaa85b5dc1a44099c94384dba2cbbf575329c0a8569ee2b48e4507633237e4b2231c90bbea855f71d

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    62.173.149.200
  • Port:
    21
  • Username:
    stealer
  • Password:
    Aqswdefr123

Extracted

Family

amadey

Version

2.15

C2

92.38.184.216/4dcYcWsw3/index.php

Targets

    • Target

      7B030FD1473BD9B213A6DA3EF3ADC19E.exe

    • Size

      2.0MB

    • MD5

      7b030fd1473bd9b213a6da3ef3adc19e

    • SHA1

      3fd6debb83d6b9b6240408fecef9946163d5a493

    • SHA256

      07eaa6e88904f46157a5e5e45dd70d6e14d5d06aae7dc17e8a2c440ff403a51e

    • SHA512

      833cf86b707836347fca8750ef0abf8d7e6f5ce56ef4dacdaa85b5dc1a44099c94384dba2cbbf575329c0a8569ee2b48e4507633237e4b2231c90bbea855f71d

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • NetSupport

      NetSupport is a remote access tool sold as a legitimate system administration software.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks