General

  • Target

    88d5553b125ae81467bcd13d259968b71fcbb8d4fcec17189135f333be65696d

  • Size

    382KB

  • Sample

    220623-swgklagea7

  • MD5

    941468d241d661ab702d712ae689f18e

  • SHA1

    931bc80f7e6d857739c387f1dac816e768fb20e1

  • SHA256

    88d5553b125ae81467bcd13d259968b71fcbb8d4fcec17189135f333be65696d

  • SHA512

    a1bc33638ab12e5384829f8bc27824a91fbef1058e53e87569b7d34549af80b81cebeb86841289e0c81f7e05b1d8a4ba31657fa56e4f7fad27465e75a055f3f5

Malware Config

Extracted

Family

amadey

Version

3.21

C2

185.215.113.15/Lkb2dxj3/index.php

Targets

    • Target

      88d5553b125ae81467bcd13d259968b71fcbb8d4fcec17189135f333be65696d

    • Size

      382KB

    • MD5

      941468d241d661ab702d712ae689f18e

    • SHA1

      931bc80f7e6d857739c387f1dac816e768fb20e1

    • SHA256

      88d5553b125ae81467bcd13d259968b71fcbb8d4fcec17189135f333be65696d

    • SHA512

      a1bc33638ab12e5384829f8bc27824a91fbef1058e53e87569b7d34549af80b81cebeb86841289e0c81f7e05b1d8a4ba31657fa56e4f7fad27465e75a055f3f5

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • suricata: ET MALWARE Amadey CnC Check-In

      suricata: ET MALWARE Amadey CnC Check-In

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks