General

  • Target

    179b3f7452ce4b1886a5cb7b9d25b9a8.exe

  • Size

    4.4MB

  • Sample

    221128-m99weahf57

  • MD5

    179b3f7452ce4b1886a5cb7b9d25b9a8

  • SHA1

    d46e5cd44e997aa558f6d37d693b4f0aa91e2cde

  • SHA256

    949008e80eb1deef3d9f2228bcde535ed3ae69ddf1ca4ecb23963f7562075d4d

  • SHA512

    bdb3819ac31b9d8496fd36b8b5efdca44e7b5418a31ed0584b53aa13f430977c9f6b07896af86f67cb39854d60327d815a7f17a1a2cf6d8e08722b9d85f88e98

  • SSDEEP

    98304:hdmx6l3XYWF3ZMlCBFY/SEQ3Bb8EHY8863Dfz7QLvqyM+7HlPc92vyY:hdmx61Y0p3lEMQEHYefkrjPcyyY

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.134.66/o7Vsjd3a2f/index.php

Targets

    • Target

      179b3f7452ce4b1886a5cb7b9d25b9a8.exe

    • Size

      4.4MB

    • MD5

      179b3f7452ce4b1886a5cb7b9d25b9a8

    • SHA1

      d46e5cd44e997aa558f6d37d693b4f0aa91e2cde

    • SHA256

      949008e80eb1deef3d9f2228bcde535ed3ae69ddf1ca4ecb23963f7562075d4d

    • SHA512

      bdb3819ac31b9d8496fd36b8b5efdca44e7b5418a31ed0584b53aa13f430977c9f6b07896af86f67cb39854d60327d815a7f17a1a2cf6d8e08722b9d85f88e98

    • SSDEEP

      98304:hdmx6l3XYWF3ZMlCBFY/SEQ3Bb8EHY8863Dfz7QLvqyM+7HlPc92vyY:hdmx61Y0p3lEMQEHYefkrjPcyyY

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks