Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
9c620345ba4a3bb0123589babe0d5b11ca7df50b57c0aedd57871ff7c794632f.exe
337KB
211220-wmge1sbde6
51d110597dbc4abb9c34606dbc28b4ee
f3fe8a15f6ed15c977b62c0ec8bbeef7900d79e2
9c620345ba4a3bb0123589babe0d5b11ca7df50b57c0aedd57871ff7c794632f
18fef945fb304c4eaa802bf0aa728c1475945b397147f19a37cb66230c289bc0183514f054c9ef7653e94ba468552964dc350dda542ece2740c7d00e3c068e39
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | redline |
Botnet | install |
C2 |
62.182.156.187:56323 |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
9c620345ba4a3bb0123589babe0d5b11ca7df50b57c0aedd57871ff7c794632f.exe
51d110597dbc4abb9c34606dbc28b4ee
337KB
f3fe8a15f6ed15c977b62c0ec8bbeef7900d79e2
9c620345ba4a3bb0123589babe0d5b11ca7df50b57c0aedd57871ff7c794632f
18fef945fb304c4eaa802bf0aa728c1475945b397147f19a37cb66230c289bc0183514f054c9ef7653e94ba468552964dc350dda542ece2740c7d00e3c068e39
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects executables packed with VMProtect commercial packer.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.