General

  • Target

    45169e0a82ef452192579ba4ba745eab482ad95f4f5874f1b9aa2662f8443ae9

  • Size

    247KB

  • Sample

    221125-g9gxqsbg5w

  • MD5

    6f8a2b08614f8bca20f714b178472c15

  • SHA1

    5db0a04a23468be94c6393466a836ccaa31ab1c9

  • SHA256

    45169e0a82ef452192579ba4ba745eab482ad95f4f5874f1b9aa2662f8443ae9

  • SHA512

    c328db6728d3b8a178d26c8974d7463e07fff98615d63db8798dd2d99781894fd514d11bcef4968203227951422c071012f2feda4be0f67d45be6c98adcfef97

  • SSDEEP

    3072:5tK+ZmgYbaPSuLYqGjZyFz6gi5hCmn53qY9C4JZp0/lf6eglihyL+x4XX0ELAq8j:3KKLYqGtyp6Emn5Hw4fGnx0n5Loj

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      45169e0a82ef452192579ba4ba745eab482ad95f4f5874f1b9aa2662f8443ae9

    • Size

      247KB

    • MD5

      6f8a2b08614f8bca20f714b178472c15

    • SHA1

      5db0a04a23468be94c6393466a836ccaa31ab1c9

    • SHA256

      45169e0a82ef452192579ba4ba745eab482ad95f4f5874f1b9aa2662f8443ae9

    • SHA512

      c328db6728d3b8a178d26c8974d7463e07fff98615d63db8798dd2d99781894fd514d11bcef4968203227951422c071012f2feda4be0f67d45be6c98adcfef97

    • SSDEEP

      3072:5tK+ZmgYbaPSuLYqGjZyFz6gi5hCmn53qY9C4JZp0/lf6eglihyL+x4XX0ELAq8j:3KKLYqGtyp6Emn5Hw4fGnx0n5Loj

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks