Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
3d19a2b767e986ae119ae7a50c648d6849b1602a04cbbf5ee0347ce02c88826e
291KB
211224-q2zl9aece7
ef9e61c45dbe3074e65505aed7c6a968
5ebdb67bcdfa54c8928ae3f59360506b7a2a77e3
3d19a2b767e986ae119ae7a50c648d6849b1602a04cbbf5ee0347ce02c88826e
f5151bc7670a89a9e592dd8d946c58741fc2d558f76101fdc8fb0f80e9737ab04b8b1753df15678a2155c2eade573753573ac9402ab92a996aabe297ad37e658
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 3.01 |
C2 |
185.215.113.35/d2VxjasuwS/index.php |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
3d19a2b767e986ae119ae7a50c648d6849b1602a04cbbf5ee0347ce02c88826e
ef9e61c45dbe3074e65505aed7c6a968
291KB
5ebdb67bcdfa54c8928ae3f59360506b7a2a77e3
3d19a2b767e986ae119ae7a50c648d6849b1602a04cbbf5ee0347ce02c88826e
f5151bc7670a89a9e592dd8d946c58741fc2d558f76101fdc8fb0f80e9737ab04b8b1753df15678a2155c2eade573753573ac9402ab92a996aabe297ad37e658
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Attempts to read the root path of hard drives other than the default C: drive.