General

  • Target

    a738a8b6ba54a5ce95e936b963ed8ca8faff681a19f9d7411bf983705ce86646

  • Size

    146KB

  • Sample

    221129-kcyqrsfc2t

  • MD5

    79c6bd3770029995e98f4b8816008485

  • SHA1

    4cab178f8bb093ad98c482616600195c6e256aee

  • SHA256

    a738a8b6ba54a5ce95e936b963ed8ca8faff681a19f9d7411bf983705ce86646

  • SHA512

    34ec52ee5d7c58b24e48318c2eedb4c15e422bcf45abe1b04a3cc56adb67feca040b0ee563c725f288ea4d2afdae5dfd1f1e966bc448ddea3a6513695dbf3100

  • SSDEEP

    3072:uO5Cpqg/vU95Mh+09DjIIzhoJ1C6DoMPP:15CoIvPzyJrH

Malware Config

Extracted

Family

amadey

Version

3.50

C2

62.204.41.252/nB8cWack3/index.php

Targets

    • Target

      a738a8b6ba54a5ce95e936b963ed8ca8faff681a19f9d7411bf983705ce86646

    • Size

      146KB

    • MD5

      79c6bd3770029995e98f4b8816008485

    • SHA1

      4cab178f8bb093ad98c482616600195c6e256aee

    • SHA256

      a738a8b6ba54a5ce95e936b963ed8ca8faff681a19f9d7411bf983705ce86646

    • SHA512

      34ec52ee5d7c58b24e48318c2eedb4c15e422bcf45abe1b04a3cc56adb67feca040b0ee563c725f288ea4d2afdae5dfd1f1e966bc448ddea3a6513695dbf3100

    • SSDEEP

      3072:uO5Cpqg/vU95Mh+09DjIIzhoJ1C6DoMPP:15CoIvPzyJrH

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks