General

  • Target

    900fa1e6b63833378bd0f1c8931fd31365f3c23b8b6f1f41270f0e9116d82b0e

  • Size

    4.6MB

  • Sample

    230220-wyzezabh55

  • MD5

    86a4a8c219dfaa2fa36681bf68ff3643

  • SHA1

    763d679de1ec1704783dbb204490564ab0e9f44b

  • SHA256

    900fa1e6b63833378bd0f1c8931fd31365f3c23b8b6f1f41270f0e9116d82b0e

  • SHA512

    aa3e5ad592f7daea0b91768214194d680e96a9c87b56668fcd1acb61578540358ccefd01251d71a7decd42501c4db37286ef9af41c2cc68f2131ca7e68bc0c63

  • SSDEEP

    98304:JAmlGtGtfthAYZG7dhCsAc1qFT9N9I/8lDYqY3mlGHXv5U2WkpVtpUBe2P:JAmaQfthG1ARFpPIklMWlGXGBe2P

Malware Config

Extracted

Family

amadey

Version

3.65

C2

77.73.134.27/8bmdh3Slb2/index.php

Targets

    • Target

      900fa1e6b63833378bd0f1c8931fd31365f3c23b8b6f1f41270f0e9116d82b0e

    • Size

      4.6MB

    • MD5

      86a4a8c219dfaa2fa36681bf68ff3643

    • SHA1

      763d679de1ec1704783dbb204490564ab0e9f44b

    • SHA256

      900fa1e6b63833378bd0f1c8931fd31365f3c23b8b6f1f41270f0e9116d82b0e

    • SHA512

      aa3e5ad592f7daea0b91768214194d680e96a9c87b56668fcd1acb61578540358ccefd01251d71a7decd42501c4db37286ef9af41c2cc68f2131ca7e68bc0c63

    • SSDEEP

      98304:JAmlGtGtfthAYZG7dhCsAc1qFT9N9I/8lDYqY3mlGHXv5U2WkpVtpUBe2P:JAmaQfthG1ARFpPIklMWlGXGBe2P

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects PseudoManuscrypt payload

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

1
T1562

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks