General

  • Target

    cb41a6b7a7f4a5bfc31a327e0f09e85e.bin

  • Size

    235KB

  • Sample

    221225-b5l31aeb3y

  • MD5

    cb41a6b7a7f4a5bfc31a327e0f09e85e

  • SHA1

    e6651675fe2c060c92fb2ad03de90d78d30116d4

  • SHA256

    97406ce4e2f14cee1e32d3bcd082878a106d34e179e7ab9bc04aa92e424e72bc

  • SHA512

    e3b1a6088e0c96ce01972cb507d231927f398aebfa2e1229c9b9bfa0a87814903035cb2981b3003cd805212c5e24a37216e60f2d6cabc7ad4d42823e838d07c1

  • SSDEEP

    6144:WkwjBO99g6779r0psUhmiIuVyD2NgfJgN:/TrOh2uVyCN2S

Malware Config

Extracted

Family

amadey

Version

3.63

C2

62.204.41.79/tT7774433/index.php

62.204.41.182/g9TTnd3bS/index.php

Targets

    • Target

      cb41a6b7a7f4a5bfc31a327e0f09e85e.bin

    • Size

      235KB

    • MD5

      cb41a6b7a7f4a5bfc31a327e0f09e85e

    • SHA1

      e6651675fe2c060c92fb2ad03de90d78d30116d4

    • SHA256

      97406ce4e2f14cee1e32d3bcd082878a106d34e179e7ab9bc04aa92e424e72bc

    • SHA512

      e3b1a6088e0c96ce01972cb507d231927f398aebfa2e1229c9b9bfa0a87814903035cb2981b3003cd805212c5e24a37216e60f2d6cabc7ad4d42823e838d07c1

    • SSDEEP

      6144:WkwjBO99g6779r0psUhmiIuVyD2NgfJgN:/TrOh2uVyCN2S

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks