General

  • Target

    e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886.zip

  • Size

    4.5MB

  • Sample

    230308-nfswgafh65

  • MD5

    46e048904c6554042a1e444a757cb6e7

  • SHA1

    46f47885f7e09ecfdcac1777f5d8734c2e46807e

  • SHA256

    8c7584f4742ce65851ca507099a58ad6fa0dacb9c6b7c8eb45494acd096e19fc

  • SHA512

    9896719d2ae1798a5e7791a6b0b7b38f53e413678414bfcc6372898effd5cc5755c684ab2891bd1833659515d2019e150332c35a6fab382ad553492f8104c336

  • SSDEEP

    98304:IEnXIIyK4CnI/F+Tcug3lMbRsaTuJEXiBlKNM/XIif:bYse+TcVcvsnTH/7

Malware Config

Extracted

Family

amadey

Version

3.65

C2

77.73.134.27/8bmdh3Slb2/index.php

Targets

    • Target

      e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886.exe

    • Size

      5.1MB

    • MD5

      e9ae314f7427e5ea9c2cc839831cf4cc

    • SHA1

      dca2ce2f88279cb4aba64d69f90e076ed8959151

    • SHA256

      e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886

    • SHA512

      311971ff2160af9a947ab6e5192767c5420072f66c6d3ec77eb8aa9362a9517d4095941fe959589cd66cf7b9da07e75ac183e03505323707c761d96dbac11510

    • SSDEEP

      98304:vT4pPO5Gn4SOAjkSvBTaPX+alSeReNBoDVF9of55zVM3TcfAtiZvk4Ul:vT62IBTamNPWOiQfB

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies security service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks