General

  • Target

    file.exe

  • Size

    318KB

  • Sample

    221128-j3valadc4y

  • MD5

    1c16b629ec5d48e48e920a0644caa990

  • SHA1

    8bc931629416972eaada63b98f4ba7ff2d23aa87

  • SHA256

    b33710748d6656a3e2874da6fe3c8cee77b9af94d7b4bf60e9f2931fb31b84b0

  • SHA512

    5f12a8afdffe9ad7af46a5475bc67100462f0f8a3fcdd04ed04c8b9f1b379ef41b540e040fa6b34f8acdf2386cf8e26dc893c05bb628abf9a0f93beab9bcb43f

  • SSDEEP

    6144:ktigPxTPDvMe5F4KPoRaGvcaFZpip4yOkEtycUkHhSfbr5:kXJTPDL5aRLvxvpQ4VBH0fbr

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.17/hfk3vK9/index.php

Targets

    • Target

      file.exe

    • Size

      318KB

    • MD5

      1c16b629ec5d48e48e920a0644caa990

    • SHA1

      8bc931629416972eaada63b98f4ba7ff2d23aa87

    • SHA256

      b33710748d6656a3e2874da6fe3c8cee77b9af94d7b4bf60e9f2931fb31b84b0

    • SHA512

      5f12a8afdffe9ad7af46a5475bc67100462f0f8a3fcdd04ed04c8b9f1b379ef41b540e040fa6b34f8acdf2386cf8e26dc893c05bb628abf9a0f93beab9bcb43f

    • SSDEEP

      6144:ktigPxTPDvMe5F4KPoRaGvcaFZpip4yOkEtycUkHhSfbr5:kXJTPDL5aRLvxvpQ4VBH0fbr

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks