General

  • Target

    bcc175418ad33872ceadd3c9242872e4198f8cf9a224c29cb091d39be371fe4c

  • Size

    205KB

  • Sample

    221126-jervkafd5w

  • MD5

    9eeaed0036250aba5f8e0efe4e511c01

  • SHA1

    e6e33e6e65e5b734840670d1f87d4e1c31a0e517

  • SHA256

    bcc175418ad33872ceadd3c9242872e4198f8cf9a224c29cb091d39be371fe4c

  • SHA512

    bc9e9d7ecd18863a991926bd88c0cd69d4afbd706eaa89b8b94d17ec6dc621aabb298013f6a8ea4980e658d49373a3d176b98bb75de81b57a7d8299d4f87caa1

  • SSDEEP

    3072:TH7mCWoFYfl65UBi1h0KriJQp1MqAYSr5Kwa8bYEO+VYKKEuTOrDyglvcoeQgDl:ngoFui1h0KWQp1M4Sswak1dKEuTGHwp

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      bcc175418ad33872ceadd3c9242872e4198f8cf9a224c29cb091d39be371fe4c

    • Size

      205KB

    • MD5

      9eeaed0036250aba5f8e0efe4e511c01

    • SHA1

      e6e33e6e65e5b734840670d1f87d4e1c31a0e517

    • SHA256

      bcc175418ad33872ceadd3c9242872e4198f8cf9a224c29cb091d39be371fe4c

    • SHA512

      bc9e9d7ecd18863a991926bd88c0cd69d4afbd706eaa89b8b94d17ec6dc621aabb298013f6a8ea4980e658d49373a3d176b98bb75de81b57a7d8299d4f87caa1

    • SSDEEP

      3072:TH7mCWoFYfl65UBi1h0KriJQp1MqAYSr5Kwa8bYEO+VYKKEuTOrDyglvcoeQgDl:ngoFui1h0KWQp1M4Sswak1dKEuTGHwp

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks