General

  • Target

    7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb

  • Size

    244KB

  • Sample

    230101-17ty3aga2t

  • MD5

    20f88f67297070067a7cf9a17bcd8904

  • SHA1

    3bcf47df92c2ace9ddc71c25d520e323743467bf

  • SHA256

    7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb

  • SHA512

    ba359e439795bd1d2bd8a1b33169920da2a348e24e68785326f59f47c0b0821eae7d0010297c9b387313794a280d1e823fd9915dc874cf2ada60364c6e1871f6

  • SSDEEP

    6144:l324aAQaiCam1I3zCtZf/NPPoNqgu1yGfIwHE:lDEmV7f/9ozu1yo

Malware Config

Extracted

Family

amadey

Version

3.63

C2

45.32.200.113/mBsjv2swweP/index.php

Targets

    • Target

      7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb

    • Size

      244KB

    • MD5

      20f88f67297070067a7cf9a17bcd8904

    • SHA1

      3bcf47df92c2ace9ddc71c25d520e323743467bf

    • SHA256

      7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb

    • SHA512

      ba359e439795bd1d2bd8a1b33169920da2a348e24e68785326f59f47c0b0821eae7d0010297c9b387313794a280d1e823fd9915dc874cf2ada60364c6e1871f6

    • SSDEEP

      6144:l324aAQaiCam1I3zCtZf/NPPoNqgu1yGfIwHE:lDEmV7f/9ozu1yo

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks