Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
d5562dfb8deb21ee383a14aa68ad6be9a5c8edac503a92c943bc5b64311395d6
291KB
211224-rhmc9adcbk
64609a89e382c2ecdcad6e01b779245d
dcf5ca7397a2fd908c254b58dffa1cfd8d245c73
d5562dfb8deb21ee383a14aa68ad6be9a5c8edac503a92c943bc5b64311395d6
71182f12e9881672310ef9f2df37fe3e96d90e36b93e2627e6b60a8a1a36088c7ce5cb14cf9832fd1ab5d403e23efd71d0f23c8a1628d77246ae14a74261cfd0
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
mubrikych.top oxxyfix.xyz |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | amadey |
Version | 3.01 |
C2 |
185.215.113.35/d2VxjasuwS/index.php |
Family | amadey |
Version | 2.86 |
C2 |
2.56.56.210/notAnoob/index.php |
d5562dfb8deb21ee383a14aa68ad6be9a5c8edac503a92c943bc5b64311395d6
64609a89e382c2ecdcad6e01b779245d
291KB
dcf5ca7397a2fd908c254b58dffa1cfd8d245c73
d5562dfb8deb21ee383a14aa68ad6be9a5c8edac503a92c943bc5b64311395d6
71182f12e9881672310ef9f2df37fe3e96d90e36b93e2627e6b60a8a1a36088c7ce5cb14cf9832fd1ab5d403e23efd71d0f23c8a1628d77246ae14a74261cfd0
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Attempts to read the root path of hard drives other than the default C: drive.