General

  • Target

    file.exe

  • Size

    574KB

  • Sample

    230206-v2jy1sfa88

  • MD5

    3ac20281c213c418608fcea6d744ae8f

  • SHA1

    694ee56f317c410cce4bb0dec9b1d6b6f4059f48

  • SHA256

    f33d6a14fc683aa41846e4073347b71810d835e5f7695dd834b98007826ec831

  • SHA512

    e07863755daa7e2fe075a6541f3bcb05c805eb807bbd6cbbe90bc659dfd1ea5b74d39ab03da1891eefbb32b64897c3ff98f28cd720648c879f0797df988872f6

  • SSDEEP

    12288:DMrky90ARrgdnN+A+9B1e04d/0htzFDFN0n/tL35gox8j:zyrOVK4dshHP0n/V3Rqj

Malware Config

Extracted

Family

amadey

Version

3.66

C2

62.204.41.4/Gol478Ns/index.php

Targets

    • Target

      file.exe

    • Size

      574KB

    • MD5

      3ac20281c213c418608fcea6d744ae8f

    • SHA1

      694ee56f317c410cce4bb0dec9b1d6b6f4059f48

    • SHA256

      f33d6a14fc683aa41846e4073347b71810d835e5f7695dd834b98007826ec831

    • SHA512

      e07863755daa7e2fe075a6541f3bcb05c805eb807bbd6cbbe90bc659dfd1ea5b74d39ab03da1891eefbb32b64897c3ff98f28cd720648c879f0797df988872f6

    • SSDEEP

      12288:DMrky90ARrgdnN+A+9B1e04d/0htzFDFN0n/tL35gox8j:zyrOVK4dshHP0n/V3Rqj

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks