General

  • Target

    file.exe

  • Size

    359KB

  • Sample

    221206-ltx18sfb88

  • MD5

    8acb7fdd9980abc8149bb8443fa3d093

  • SHA1

    6e3fd659b2e7614499530fb8f13d459701a04dbc

  • SHA256

    8cb087d86258be00fbdb327c9bf8e4546e2373c39b3dfbd44833f5d32758bd22

  • SHA512

    ff795c6de9cdf568e93fb0845dd7ae54a69071fddb3c2a82521927132b734967099ecaff811d101d5ecc727e548bce30925193838fa5e4651b30d3fe320a49ec

  • SSDEEP

    6144:idnyHJLjj0BnTtiJtSKSvAxtEn6eq55ad81uF:iNyp/j0BnBrfvAxGXqduF

Malware Config

Extracted

Family

amadey

Version

3.50

C2

77.73.133.72/hfk3vK9/index.php

Targets

    • Target

      file.exe

    • Size

      359KB

    • MD5

      8acb7fdd9980abc8149bb8443fa3d093

    • SHA1

      6e3fd659b2e7614499530fb8f13d459701a04dbc

    • SHA256

      8cb087d86258be00fbdb327c9bf8e4546e2373c39b3dfbd44833f5d32758bd22

    • SHA512

      ff795c6de9cdf568e93fb0845dd7ae54a69071fddb3c2a82521927132b734967099ecaff811d101d5ecc727e548bce30925193838fa5e4651b30d3fe320a49ec

    • SSDEEP

      6144:idnyHJLjj0BnTtiJtSKSvAxtEn6eq55ad81uF:iNyp/j0BnBrfvAxGXqduF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks