General

  • Target

    7dea75243493cbd33152cc3efb2d3f6a8222c29c659b7f9ce1f2cdf3f7f6dbd5

  • Size

    205KB

  • Sample

    221129-yk91nadh6s

  • MD5

    ed665d76107249732f4d9d4b4b6e96d3

  • SHA1

    f89968a5852e6e77bbaabcbc7f27b6e46bee3c53

  • SHA256

    7dea75243493cbd33152cc3efb2d3f6a8222c29c659b7f9ce1f2cdf3f7f6dbd5

  • SHA512

    2a61663946e5039266923c88167cf5d9c93e1abad13362bf2e076c48df6f56bd9507f58c9cf13223dfe6335542fee010f06423c3ab3aae697e58574a5cbb89c8

  • SSDEEP

    6144:1rn5I2yTqlsFz90AIKYiAIHRhVGL5N/Y:1C2yTasFzaAoiA4Rs5N

Malware Config

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Targets

    • Target

      7dea75243493cbd33152cc3efb2d3f6a8222c29c659b7f9ce1f2cdf3f7f6dbd5

    • Size

      205KB

    • MD5

      ed665d76107249732f4d9d4b4b6e96d3

    • SHA1

      f89968a5852e6e77bbaabcbc7f27b6e46bee3c53

    • SHA256

      7dea75243493cbd33152cc3efb2d3f6a8222c29c659b7f9ce1f2cdf3f7f6dbd5

    • SHA512

      2a61663946e5039266923c88167cf5d9c93e1abad13362bf2e076c48df6f56bd9507f58c9cf13223dfe6335542fee010f06423c3ab3aae697e58574a5cbb89c8

    • SSDEEP

      6144:1rn5I2yTqlsFz90AIKYiAIHRhVGL5N/Y:1C2yTasFzaAoiA4Rs5N

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks