General

  • Target

    e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886

  • Size

    5.1MB

  • Sample

    230224-xj3phsab8t

  • MD5

    e9ae314f7427e5ea9c2cc839831cf4cc

  • SHA1

    dca2ce2f88279cb4aba64d69f90e076ed8959151

  • SHA256

    e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886

  • SHA512

    311971ff2160af9a947ab6e5192767c5420072f66c6d3ec77eb8aa9362a9517d4095941fe959589cd66cf7b9da07e75ac183e03505323707c761d96dbac11510

  • SSDEEP

    98304:vT4pPO5Gn4SOAjkSvBTaPX+alSeReNBoDVF9of55zVM3TcfAtiZvk4Ul:vT62IBTamNPWOiQfB

Malware Config

Extracted

Family

amadey

Version

3.65

C2

77.73.134.27/8bmdh3Slb2/index.php

Targets

    • Target

      e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886

    • Size

      5.1MB

    • MD5

      e9ae314f7427e5ea9c2cc839831cf4cc

    • SHA1

      dca2ce2f88279cb4aba64d69f90e076ed8959151

    • SHA256

      e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886

    • SHA512

      311971ff2160af9a947ab6e5192767c5420072f66c6d3ec77eb8aa9362a9517d4095941fe959589cd66cf7b9da07e75ac183e03505323707c761d96dbac11510

    • SSDEEP

      98304:vT4pPO5Gn4SOAjkSvBTaPX+alSeReNBoDVF9of55zVM3TcfAtiZvk4Ul:vT62IBTamNPWOiQfB

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detects PseudoManuscrypt payload

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • PseudoManuscrypt

      PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

1
T1562

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks