General

  • Target

    file.exe

  • Size

    244KB

  • Sample

    221123-pql2cafb4t

  • MD5

    e516ddcfdd8c967ad2581668722af31e

  • SHA1

    1588f5298a8bbea3050a8effdfdf2b189345df1d

  • SHA256

    4886796ce26b6d84d4ca02233f39751892eeef86027077ca8c49f4909ffe83ad

  • SHA512

    c86c05f25266c4877c2d62ceb7089a318248e2ccff8cb4dc5d2c60c3305883c4d76864c8ebbaa2465578926e2ee6c67015573a75a0d4430a1562cfb26f6f2c0e

  • SSDEEP

    6144:+liLwJMYm/OJ2IrfyOPL21ctM6i3mXtT9:+li5z/hoPPkV6i3ot

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      file.exe

    • Size

      244KB

    • MD5

      e516ddcfdd8c967ad2581668722af31e

    • SHA1

      1588f5298a8bbea3050a8effdfdf2b189345df1d

    • SHA256

      4886796ce26b6d84d4ca02233f39751892eeef86027077ca8c49f4909ffe83ad

    • SHA512

      c86c05f25266c4877c2d62ceb7089a318248e2ccff8cb4dc5d2c60c3305883c4d76864c8ebbaa2465578926e2ee6c67015573a75a0d4430a1562cfb26f6f2c0e

    • SSDEEP

      6144:+liLwJMYm/OJ2IrfyOPL21ctM6i3mXtT9:+li5z/hoPPkV6i3ot

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks