General

  • Target

    a0ba61cdc118189e5417f6696c4896e7070e78cd4f4e4599068916cd9084dc65

  • Size

    184KB

  • Sample

    221123-xekm5seg47

  • MD5

    f44287f7603e1eb1007e6a7c3ac41ef9

  • SHA1

    88216da836a1ca42ef5100fdf54f06fbc4bf1c16

  • SHA256

    884ffb6ae8083046b1e1297b300ba6b80ab09581f9efff4c185fbd0c3cc9d1f5

  • SHA512

    298d95a123905672aac8e590557760f1f273fafc0abd4062926a0bb834daf063bf254fb5a0a29836af25242163dbdca941b95d6ff8fc86c2b519a0371ae9e237

  • SSDEEP

    3072:IiKtZA9deGSPKHshSMUDTAYYGcY/M0n1DsdB7ShaHlx9JowEALkxkn:IZAn8CUSMaAnh01oxFthEk

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      a0ba61cdc118189e5417f6696c4896e7070e78cd4f4e4599068916cd9084dc65

    • Size

      244KB

    • MD5

      b167de50d4f69ca5132bf2ab8a627451

    • SHA1

      7be661df0a1daea1026e19f278a5e001bda4ff63

    • SHA256

      a0ba61cdc118189e5417f6696c4896e7070e78cd4f4e4599068916cd9084dc65

    • SHA512

      df243f49f9b1c42a6cd7e29eff55d8a28176ecc6e8ee3833da48e8eb35a5fd4ce420e394bc797f16c3172ca4aa88e5ed76ae42bd6d0cb07ffb545c8ba25b4099

    • SSDEEP

      3072:WDA1BBEyyiLknwWXBGo5Uxyfdncbn1DsdBDShaHlx9JWwEApQS:0AuuLknwi88m71GxFtnEE

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks