Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
bd4c3123f7780eebb986923c6811985a6d2dd518b00d8d1bbba035c72505f49e
133KB
211221-q8k3fadff4
2c1a0dcfae1f2014e492f72d9245d654
3302cc147cf879a92d8e3022e01bb394c5f18aff
bd4c3123f7780eebb986923c6811985a6d2dd518b00d8d1bbba035c72505f49e
16fede2805a305b57b890943826dbc0056143302a6596260afba20e9a2088454aa352fc5594a682577c6181de36e9c86fe3bece410f963a49268936866451a8f
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | redline |
Botnet | install |
C2 |
62.182.156.187:56323 |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
Family | redline |
Botnet | runpe |
C2 |
142.202.242.172:7667 |
bd4c3123f7780eebb986923c6811985a6d2dd518b00d8d1bbba035c72505f49e
2c1a0dcfae1f2014e492f72d9245d654
133KB
3302cc147cf879a92d8e3022e01bb394c5f18aff
bd4c3123f7780eebb986923c6811985a6d2dd518b00d8d1bbba035c72505f49e
16fede2805a305b57b890943826dbc0056143302a6596260afba20e9a2088454aa352fc5594a682577c6181de36e9c86fe3bece410f963a49268936866451a8f
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Detects executables packed with VMProtect commercial packer.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.