General

  • Target

    file.exe

  • Size

    273KB

  • Sample

    221216-pawkvahe21

  • MD5

    0d19dd34e4a3cef4d08487cec753152c

  • SHA1

    9df832af91f699cc204a75f772c0a06cd94a3584

  • SHA256

    6cc55822beeb659db5a012f49e425b5ef485f230dbe2e34b92654127151ac8db

  • SHA512

    5cc68519be58f0e8b6f01e8d6b7c873746d7386b25a9e31bfef3b90c17c7eb6679a7d2caa308770cf711fc01a85b58c11376692e1964a077e3ec2f02f399cc0e

  • SSDEEP

    6144:4TuffLa3ABzimv3vXxyJAxOegbDx6UCJtps5U8qMrc:4TuffYamANFskUgfs5U8n

Malware Config

Extracted

Family

amadey

Version

3.60

C2

62.204.41.79/fb73jc3/index.php

Targets

    • Target

      file.exe

    • Size

      273KB

    • MD5

      0d19dd34e4a3cef4d08487cec753152c

    • SHA1

      9df832af91f699cc204a75f772c0a06cd94a3584

    • SHA256

      6cc55822beeb659db5a012f49e425b5ef485f230dbe2e34b92654127151ac8db

    • SHA512

      5cc68519be58f0e8b6f01e8d6b7c873746d7386b25a9e31bfef3b90c17c7eb6679a7d2caa308770cf711fc01a85b58c11376692e1964a077e3ec2f02f399cc0e

    • SSDEEP

      6144:4TuffLa3ABzimv3vXxyJAxOegbDx6UCJtps5U8qMrc:4TuffYamANFskUgfs5U8n

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks