General

  • Target

    1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62

  • Size

    184KB

  • Sample

    221123-vaqmgsge28

  • MD5

    6e50f2edef8792a5bc8433ace3e5d995

  • SHA1

    881abbc19cb8f1f4d4a8b4b438a88ced5888cbe5

  • SHA256

    a2d3a31b8a5262d199ef56feaba63ad0da7ac4437a9de346f8f5404b4e5b8c95

  • SHA512

    15ac3ab297f958d9710eb9aa73e06d845e062cf927f9f6b4bc3ce1d119f21ae2f98a502438d3a67c3c3a2db6420d4bf4606c9c1262c16115414e2b4dabded579

  • SSDEEP

    3072:r3Y3Pv+5pvNeFsHx3arxn8LVtKweqJ4kN/f/6kpXr5sEkU9YDayeskby1mGm8pGp:cn+pFAxnutlWKnyWXNv1aayeX887

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62

    • Size

      244KB

    • MD5

      ee1e865bb346ca034571540c7f7a985b

    • SHA1

      fd9ce830e59dbf847f051ea5af5945ab2e7bc1b6

    • SHA256

      1e3386190d8323958a031a015f563ba3b99b4b57c7cdbc995a50d6bf56005d62

    • SHA512

      5beb175ae3e19a5e1bf2486b1a692e0a44daed8373b1330b642daa6b2e9d7efbd23d0746c775ea2b56aeed7483474b5f1745001e74edea41c5589c2dab7ad1fd

    • SSDEEP

      6144:3ycZLC8LC3A14AwKnyWXNvJaayuLnvYm:3yY1LC3AFwKykbR9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks