General

  • Target

    file.exe

  • Size

    416KB

  • Sample

    221206-r5vm5sgb49

  • MD5

    d1ea7c87dedd4ba5b8a64f1eccd843ca

  • SHA1

    09e69c0da29abc3e22eb5dd71a0e2529e2c73278

  • SHA256

    98ec5e3780c99c97c3928fbc36f5ab0ab52b3aeda7b84e73be392c64619ee63c

  • SHA512

    216fbc0e0cd3f9705df91e5b3c21abde27811f67a237e5e5f11a670958826381580e1772531f9189183cb4fcb15c75655e23ccefb1e26d90a9acd3e41c383ebb

  • SSDEEP

    6144:BinAGPLrTju+Ot/WCpoznJhrLBryigsAbPMk:BaAsHXu+io9hrNryz

Malware Config

Extracted

Family

amadey

Version

3.50

C2

62.204.41.6/p9cWxH/index.php

Targets

    • Target

      file.exe

    • Size

      416KB

    • MD5

      d1ea7c87dedd4ba5b8a64f1eccd843ca

    • SHA1

      09e69c0da29abc3e22eb5dd71a0e2529e2c73278

    • SHA256

      98ec5e3780c99c97c3928fbc36f5ab0ab52b3aeda7b84e73be392c64619ee63c

    • SHA512

      216fbc0e0cd3f9705df91e5b3c21abde27811f67a237e5e5f11a670958826381580e1772531f9189183cb4fcb15c75655e23ccefb1e26d90a9acd3e41c383ebb

    • SSDEEP

      6144:BinAGPLrTju+Ot/WCpoznJhrLBryigsAbPMk:BaAsHXu+io9hrNryz

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks