Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
8c3223abe34b2be4cbc6af48963ceda1.exe
281KB
220114-adswssddhj
8c3223abe34b2be4cbc6af48963ceda1
ed538d7d21f6fe3f3cc4d8fd7c93288c7e9b9651
4e9aabb8abf8954eb2edc1ac5e5d80efb995b570af08dbc229930e471ae9bf08
ad7ea92ac40cb0c92646f16401c5b7d86ba26cd2aa47206fc03630b2566f7068fdeec10e7e4c4bf43eaaa62eeb945e0785103eb4cfb44a5213fb2e85e56191de
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | arkei |
Botnet | Default |
C2 |
http://file-file-host4.com/tratata.php |
Family | tofsee |
C2 |
patmushta.info parubey.info |
Family | amadey |
Version | 3.01 |
C2 |
185.215.113.35/d2VxjasuwS/index.php |
8c3223abe34b2be4cbc6af48963ceda1.exe
8c3223abe34b2be4cbc6af48963ceda1
281KB
ed538d7d21f6fe3f3cc4d8fd7c93288c7e9b9651
4e9aabb8abf8954eb2edc1ac5e5d80efb995b570af08dbc229930e471ae9bf08
ad7ea92ac40cb0c92646f16401c5b7d86ba26cd2aa47206fc03630b2566f7068fdeec10e7e4c4bf43eaaa62eeb945e0785103eb4cfb44a5213fb2e85e56191de
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
LoaderBot is a loader written in .NET downloading and executing miners.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects executables packed with UPX/modified UPX open source packer.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.