General

  • Target

    1cf0606188a54423e16fde1ec18666e9fc3a0583bd449d754ef9dcb469754ee4

  • Size

    281KB

  • Sample

    221224-j6jy2ach9s

  • MD5

    f6fd6a9c5c03fe85baf3fa82ba3f48c6

  • SHA1

    64d2b715f2abe214f030d6cb92e553fe4a9f3f01

  • SHA256

    1cf0606188a54423e16fde1ec18666e9fc3a0583bd449d754ef9dcb469754ee4

  • SHA512

    83b1f4226e635ca5b748aa3cb3ff2f3d8e3bd8d78ca8f00b6f3b87e3c9770dd8fb9b24494ec1372ac171d9f514ce78427c142e9d7103e0d7d77cfbad1aa3ddb8

  • SSDEEP

    3072:Db9CALbZR25Aq3V1q84uGjIxy7Znm3otqM6yCN9ZCs+uLgRPH8oSda67RY3Ox6qn:XLbr6TG0xGVaQytZCs+B8o16tHk5o

Malware Config

Extracted

Family

amadey

Version

3.61

C2

62.204.41.79/U7vfDb3kg/index.php

Targets

    • Target

      1cf0606188a54423e16fde1ec18666e9fc3a0583bd449d754ef9dcb469754ee4

    • Size

      281KB

    • MD5

      f6fd6a9c5c03fe85baf3fa82ba3f48c6

    • SHA1

      64d2b715f2abe214f030d6cb92e553fe4a9f3f01

    • SHA256

      1cf0606188a54423e16fde1ec18666e9fc3a0583bd449d754ef9dcb469754ee4

    • SHA512

      83b1f4226e635ca5b748aa3cb3ff2f3d8e3bd8d78ca8f00b6f3b87e3c9770dd8fb9b24494ec1372ac171d9f514ce78427c142e9d7103e0d7d77cfbad1aa3ddb8

    • SSDEEP

      3072:Db9CALbZR25Aq3V1q84uGjIxy7Znm3otqM6yCN9ZCs+uLgRPH8oSda67RY3Ox6qn:XLbr6TG0xGVaQytZCs+B8o16tHk5o

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks