General

  • Target

    9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33

  • Size

    189KB

  • Sample

    221125-f4mqcsdf87

  • MD5

    e542bea8f1d2dac9a954396b7eeceeb4

  • SHA1

    94eb8868dc85e0d5d5df3f65db5b14120742ed0a

  • SHA256

    9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33

  • SHA512

    83d5abb3983807500365de35e59627a2337e5f7d1e9adadddfa6558ede8aeaa96b911e0b4b5fc2d9ecb41938fb65504d26430efd4860be8a7279b99f052ddd7d

  • SSDEEP

    3072:gDpZbM1di2kiLeN+Av/fID5jx0jD5NePvHrMKVBZY:+p4LeN+AveSX5NenLMKVg

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.65/o7VsjdSa2f/index.php

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33

    • Size

      189KB

    • MD5

      e542bea8f1d2dac9a954396b7eeceeb4

    • SHA1

      94eb8868dc85e0d5d5df3f65db5b14120742ed0a

    • SHA256

      9f34dfb4cbc230498bb4be758dcd11dbd7529adb226647057dd4e2869bc11b33

    • SHA512

      83d5abb3983807500365de35e59627a2337e5f7d1e9adadddfa6558ede8aeaa96b911e0b4b5fc2d9ecb41938fb65504d26430efd4860be8a7279b99f052ddd7d

    • SSDEEP

      3072:gDpZbM1di2kiLeN+Av/fID5jx0jD5NePvHrMKVBZY:+p4LeN+AveSX5NenLMKVg

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks