General

  • Target

    ec6c80c5368cd7730f5b5fea30e7c99a.exe

  • Size

    285KB

  • Sample

    221225-vkn7eabg59

  • MD5

    ec6c80c5368cd7730f5b5fea30e7c99a

  • SHA1

    41e9fb66c28f965cf5afd2e56602f155d973a83d

  • SHA256

    8d32e430ecb3f4a0f1d830110ac279241c2691e514adf0986288f00b32b57d2e

  • SHA512

    47851da24cc2c694a2a294f5c8609508a16779df45b63f31e8b0d659623535c31fc00fd745117495fd1d59abea95744f86d79209cd989fe5131b94c89ddfadc4

  • SSDEEP

    6144:ujL67avoujZou3NnQs5rUX9NyqJ/oGymI:e27avZ9dQ4lqV8m

Malware Config

Extracted

Family

amadey

Version

3.61

C2

62.204.41.79/U7vfDb3kg/index.php

Targets

    • Target

      ec6c80c5368cd7730f5b5fea30e7c99a.exe

    • Size

      285KB

    • MD5

      ec6c80c5368cd7730f5b5fea30e7c99a

    • SHA1

      41e9fb66c28f965cf5afd2e56602f155d973a83d

    • SHA256

      8d32e430ecb3f4a0f1d830110ac279241c2691e514adf0986288f00b32b57d2e

    • SHA512

      47851da24cc2c694a2a294f5c8609508a16779df45b63f31e8b0d659623535c31fc00fd745117495fd1d59abea95744f86d79209cd989fe5131b94c89ddfadc4

    • SSDEEP

      6144:ujL67avoujZou3NnQs5rUX9NyqJ/oGymI:e27avZ9dQ4lqV8m

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks