General

  • Target

    a2a1ce968e4ed92a2cc6106a55412fddea814ad0bd45320f1137fad0b8f332e5

  • Size

    3.9MB

  • Sample

    230205-rgb6wsdb41

  • MD5

    7340cf4120bb8525242747c061b2c09e

  • SHA1

    b02e9abf92bded5717ef6a8be56bdba06cee6145

  • SHA256

    a2a1ce968e4ed92a2cc6106a55412fddea814ad0bd45320f1137fad0b8f332e5

  • SHA512

    79974f20bf6a283261e7d526e74652a74e4b53f424da1660bd107948706825e70907b64ac191891bdd1eaeb73ebc883ce375e6462f39cccfa09136e92f716225

  • SSDEEP

    49152:8bzB125+EjjL0jFeHLYFDe7uS/y8WBdk92ZKdxL3tQpuT6jc1tp0XsMX:ktEjn0jFerYo86DdRtGuT8wJ

Malware Config

Extracted

Family

amadey

Version

3.65

C2

77.73.134.27/8bmdh3Slb2/index.php

Targets

    • Target

      a2a1ce968e4ed92a2cc6106a55412fddea814ad0bd45320f1137fad0b8f332e5

    • Size

      3.9MB

    • MD5

      7340cf4120bb8525242747c061b2c09e

    • SHA1

      b02e9abf92bded5717ef6a8be56bdba06cee6145

    • SHA256

      a2a1ce968e4ed92a2cc6106a55412fddea814ad0bd45320f1137fad0b8f332e5

    • SHA512

      79974f20bf6a283261e7d526e74652a74e4b53f424da1660bd107948706825e70907b64ac191891bdd1eaeb73ebc883ce375e6462f39cccfa09136e92f716225

    • SSDEEP

      49152:8bzB125+EjjL0jFeHLYFDe7uS/y8WBdk92ZKdxL3tQpuT6jc1tp0XsMX:ktEjn0jFerYo86DdRtGuT8wJ

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks