General

  • Target

    679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611

  • Size

    188KB

  • Sample

    221125-aq9p3sch5w

  • MD5

    a1869e1eecba9d00d4de3c9f274374ad

  • SHA1

    5dbefd0a2c7b3bd79a7664ff9ca517a4257b42f9

  • SHA256

    679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611

  • SHA512

    2a6bf01aa251d3b44642c8c6ed92bbdb6b6f9ac4cfb707b6b98982568ccfad985da7f22018da3bdc8a120836e6de3422569023aa16d28af3ebc80c921a77e891

  • SSDEEP

    3072:CH9bzazHTZrY/TxLiUE41a9B2D5E5JLmr6CzHyTut8IQZB0YZ9Y2Ozh:o9idiLjE4sBfJeHybRZnZ9VO9

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.65/o7VsjdSa2f/index.php

Targets

    • Target

      679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611

    • Size

      188KB

    • MD5

      a1869e1eecba9d00d4de3c9f274374ad

    • SHA1

      5dbefd0a2c7b3bd79a7664ff9ca517a4257b42f9

    • SHA256

      679e55f3d3d0080d45e352c36c58fcd94fdaacc6f74ffc7cbb19b03911ef5611

    • SHA512

      2a6bf01aa251d3b44642c8c6ed92bbdb6b6f9ac4cfb707b6b98982568ccfad985da7f22018da3bdc8a120836e6de3422569023aa16d28af3ebc80c921a77e891

    • SSDEEP

      3072:CH9bzazHTZrY/TxLiUE41a9B2D5E5JLmr6CzHyTut8IQZB0YZ9Y2Ozh:o9idiLjE4sBfJeHybRZnZ9VO9

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks