General

  • Target

    cd6697e37b0b7229a3aae43009e69fe7ea890a00236c3cad176934f7f6f6605f

  • Size

    1.1MB

  • Sample

    230416-nlmlmsbf71

  • MD5

    ebc790f8f523ee0de52674be05170bac

  • SHA1

    9188a7d02b10605b2a8770071ced94c48e29f72f

  • SHA256

    cd6697e37b0b7229a3aae43009e69fe7ea890a00236c3cad176934f7f6f6605f

  • SHA512

    9a006b6488ccbff9bc5f12f312c0252b088e3e5dc5ff95eb9dce0f867f8250f771f368eee0efd4f40973cf8b3d70be4e976a6777349daa1f079bf5f61b179437

  • SSDEEP

    24576:2y3f29vd+yX8IgwMGMZyI0yOiRJ4DRVgqQ6i20V9b04yZ5k9:FPwcDoMwsOUmCqbiZvb0

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      cd6697e37b0b7229a3aae43009e69fe7ea890a00236c3cad176934f7f6f6605f

    • Size

      1.1MB

    • MD5

      ebc790f8f523ee0de52674be05170bac

    • SHA1

      9188a7d02b10605b2a8770071ced94c48e29f72f

    • SHA256

      cd6697e37b0b7229a3aae43009e69fe7ea890a00236c3cad176934f7f6f6605f

    • SHA512

      9a006b6488ccbff9bc5f12f312c0252b088e3e5dc5ff95eb9dce0f867f8250f771f368eee0efd4f40973cf8b3d70be4e976a6777349daa1f079bf5f61b179437

    • SSDEEP

      24576:2y3f29vd+yX8IgwMGMZyI0yOiRJ4DRVgqQ6i20V9b04yZ5k9:FPwcDoMwsOUmCqbiZvb0

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks