Description
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
8abe3174cfd23abb63418dfa64109c7c.exe
312KB
220114-ndpq2agagr
8abe3174cfd23abb63418dfa64109c7c
6370245ac968e309d2916ac9d999797a479b77e4
93fddb1a745fec7ae8bc3a7f8d66ce73b1841998e9b0589790e924ff6efb6a05
47c7d676104310d66cbdd3a134803991901f0e9e457589a9c5ae9685942812095e2b4911dfcb7b7bad606dffc649b9ebf05ee8fcedd8e3237ae0d46220fee043
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | arkei |
Botnet | Default |
C2 |
http://file-file-host4.com/tratata.php |
Family | tofsee |
C2 |
patmushta.info parubey.info |
Family | amadey |
Version | 3.01 |
C2 |
185.215.113.35/d2VxjasuwS/index.php |
Family | raccoon |
Version | 1.8.4-hotfixs |
rc4.plain |
|
8abe3174cfd23abb63418dfa64109c7c.exe
8abe3174cfd23abb63418dfa64109c7c
312KB
6370245ac968e309d2916ac9d999797a479b77e4
93fddb1a745fec7ae8bc3a7f8d66ce73b1841998e9b0589790e924ff6efb6a05
47c7d676104310d66cbdd3a134803991901f0e9e457589a9c5ae9685942812095e2b4911dfcb7b7bad606dffc649b9ebf05ee8fcedd8e3237ae0d46220fee043
Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.
Arkei is an infostealer written in C++.
LoaderBot is a loader written in .NET downloading and executing miners.
Simple but powerful infostealer which was very active in 2019.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Modifies file attributes to stop it showing in Explorer etc.
Detects executables packed with UPX/modified UPX open source packer.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.