General

  • Target

    63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7

  • Size

    417KB

  • Sample

    221206-m3b1ssbd66

  • MD5

    6ec87ebea87e5e9aa7e1961eb45763fc

  • SHA1

    a543356fd5d7bb2674e21a272839c23c6f50859d

  • SHA256

    63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7

  • SHA512

    e30e0e6435607ab7d5be9201ad551a697c6e8fa499fb07d229400ee8d2d0ae18fcc739f42142a587d2496e2d19602e159fe87512fc7c40b3d71883bb62ff60c5

  • SSDEEP

    6144:ZchyyvLDAN1kbT+SwR7zxZVi5+yig7OARlPMk:ZcygfAN1kItVLyz

Malware Config

Extracted

Family

amadey

Version

3.50

C2

31.41.244.167/v7eWcjs/index.php

Targets

    • Target

      63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7

    • Size

      417KB

    • MD5

      6ec87ebea87e5e9aa7e1961eb45763fc

    • SHA1

      a543356fd5d7bb2674e21a272839c23c6f50859d

    • SHA256

      63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7

    • SHA512

      e30e0e6435607ab7d5be9201ad551a697c6e8fa499fb07d229400ee8d2d0ae18fcc739f42142a587d2496e2d19602e159fe87512fc7c40b3d71883bb62ff60c5

    • SSDEEP

      6144:ZchyyvLDAN1kbT+SwR7zxZVi5+yig7OARlPMk:ZcygfAN1kItVLyz

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks