General

  • Target

    6e9aaded5ff16fd021df120d9a310ffd89a9fd947b914f777063629f26251814

  • Size

    205KB

  • Sample

    221127-jhnmbaad58

  • MD5

    aa719605c9cde2744d6665b51db8f582

  • SHA1

    428039ac9099372998381b33dcacd628cee63c04

  • SHA256

    6e9aaded5ff16fd021df120d9a310ffd89a9fd947b914f777063629f26251814

  • SHA512

    c14aa9fd80638f92521ed6701c5107da71d0dfb733e550ea8b80087bfac1c0908f52b0ff623b054185a8adadb801a2a90371158c4a8a24ac44d9c856e13ec397

  • SSDEEP

    3072:WSfBDGyarEOj89B5wERQZtwLRZu4N4AbA5R7RA+lpI/lh3vDuBeRzag8JO:xDar7jtERQZtO7u2bA5R7VpIJu

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.17/hfk3vK9/index.php

Targets

    • Target

      6e9aaded5ff16fd021df120d9a310ffd89a9fd947b914f777063629f26251814

    • Size

      205KB

    • MD5

      aa719605c9cde2744d6665b51db8f582

    • SHA1

      428039ac9099372998381b33dcacd628cee63c04

    • SHA256

      6e9aaded5ff16fd021df120d9a310ffd89a9fd947b914f777063629f26251814

    • SHA512

      c14aa9fd80638f92521ed6701c5107da71d0dfb733e550ea8b80087bfac1c0908f52b0ff623b054185a8adadb801a2a90371158c4a8a24ac44d9c856e13ec397

    • SSDEEP

      3072:WSfBDGyarEOj89B5wERQZtwLRZu4N4AbA5R7RA+lpI/lh3vDuBeRzag8JO:xDar7jtERQZtO7u2bA5R7VpIJu

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks