Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
ababf4111b1ea420e9bec442245662357b2bf32d806973bd3c21bcb9a42a139b
291KB
211224-qhz4nsdbar
c20cbe7b384f8617f09cc9bfa51fd795
371297be42bf5933e0ef7f29df32db369bb0ea38
ababf4111b1ea420e9bec442245662357b2bf32d806973bd3c21bcb9a42a139b
fb2cf0c45def2ba8e47080d3eee8292a312852935f3c9e49946d51a0bb2c3dfa6672a4372f8c30df11c2e11568b313ccaea4b8cfdf7bf4814d5e43d2a82692d3
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ |
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 3.01 |
C2 |
185.215.113.35/d2VxjasuwS/index.php |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
ababf4111b1ea420e9bec442245662357b2bf32d806973bd3c21bcb9a42a139b
c20cbe7b384f8617f09cc9bfa51fd795
291KB
371297be42bf5933e0ef7f29df32db369bb0ea38
ababf4111b1ea420e9bec442245662357b2bf32d806973bd3c21bcb9a42a139b
fb2cf0c45def2ba8e47080d3eee8292a312852935f3c9e49946d51a0bb2c3dfa6672a4372f8c30df11c2e11568b313ccaea4b8cfdf7bf4814d5e43d2a82692d3
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.