General

  • Target

    6f515fec59f421cd440b1a5f3e1bf8a31c52a8bd9825f8a353fa29ac68961918

  • Size

    246KB

  • Sample

    221124-3vrdhsgc73

  • MD5

    d57b6299fbaff2466997444e211cb46e

  • SHA1

    a4421aaab0f3e0e7db2b8c7fb948da8659945c0b

  • SHA256

    6f515fec59f421cd440b1a5f3e1bf8a31c52a8bd9825f8a353fa29ac68961918

  • SHA512

    5726fce126508ad2e2f1542583766acd44a2b98c97d0a10be26e0eaa11c6ab2043d50d22aea1a48914561c673b196d9e09c68fd11dbd4c2558bb0fc6affd29ac

  • SSDEEP

    6144:3jeagmLLH7bZ+yjYGRg7ivy/6cBEdqAN:3jeaz3H7bQvGRgG0DEU

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      6f515fec59f421cd440b1a5f3e1bf8a31c52a8bd9825f8a353fa29ac68961918

    • Size

      246KB

    • MD5

      d57b6299fbaff2466997444e211cb46e

    • SHA1

      a4421aaab0f3e0e7db2b8c7fb948da8659945c0b

    • SHA256

      6f515fec59f421cd440b1a5f3e1bf8a31c52a8bd9825f8a353fa29ac68961918

    • SHA512

      5726fce126508ad2e2f1542583766acd44a2b98c97d0a10be26e0eaa11c6ab2043d50d22aea1a48914561c673b196d9e09c68fd11dbd4c2558bb0fc6affd29ac

    • SSDEEP

      6144:3jeagmLLH7bZ+yjYGRg7ivy/6cBEdqAN:3jeaz3H7bQvGRgG0DEU

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks