General

  • Target

    tmp

  • Size

    226KB

  • Sample

    221125-vp9nxaca76

  • MD5

    7d5768018e43db010843b5c0f87cf507

  • SHA1

    5dcde68657061bdc91f84449a5c9836a0327748d

  • SHA256

    a718e90f08e4e3a15d0acbe4d6f1ac4e49dc3e5e95460d4a4a9e2a77e4cf6217

  • SHA512

    7f05d2a3a13614bc0a0433cc9b7beb306d1cc5f384f201227c6011d116d036071b3fe1aca08857fc32ca544ce610f2341f9cc8bf5bb3d84ccb26a37ce444f91b

  • SSDEEP

    3072:KM31JsLgZNzysB3w5RGZ/3a+iL1BKJzx4I71vEkTEwLqd0s9FnV:BqaNzysBp/3LiW/4GEkTEld0W

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      tmp

    • Size

      226KB

    • MD5

      7d5768018e43db010843b5c0f87cf507

    • SHA1

      5dcde68657061bdc91f84449a5c9836a0327748d

    • SHA256

      a718e90f08e4e3a15d0acbe4d6f1ac4e49dc3e5e95460d4a4a9e2a77e4cf6217

    • SHA512

      7f05d2a3a13614bc0a0433cc9b7beb306d1cc5f384f201227c6011d116d036071b3fe1aca08857fc32ca544ce610f2341f9cc8bf5bb3d84ccb26a37ce444f91b

    • SSDEEP

      3072:KM31JsLgZNzysB3w5RGZ/3a+iL1BKJzx4I71vEkTEwLqd0s9FnV:BqaNzysBp/3LiW/4GEkTEld0W

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks