General

  • Target

    bfa4ee6a3152b946f6e02a58ce8aa2daa96bd29d5438195263a8eac387c782dc

  • Size

    1.6MB

  • Sample

    230418-g4v76sbf9t

  • MD5

    88e3ed5a222c15de07ea09cc8e0f6c30

  • SHA1

    47a2edca4ffd880dac1febcaeeeac43d46cbd219

  • SHA256

    bfa4ee6a3152b946f6e02a58ce8aa2daa96bd29d5438195263a8eac387c782dc

  • SHA512

    e2feaa504b80d2363957c631b26f8e7c3f9a9e573b76692e9d471260dc248775ead0fada7b75acf4fa215fa262d750c240d995962647f1395bafbed1912622e9

  • SSDEEP

    49152:GqhJEr8AS9N8dW/snJ7v03v2YJTs0UEtIXNbhS:3E4idW/snJ7XYJTs0UCIXz

Malware Config

Extracted

Family

amadey

Version

3.70

C2

193.201.9.43/plays/chapter/index.php

Targets

    • Target

      bfa4ee6a3152b946f6e02a58ce8aa2daa96bd29d5438195263a8eac387c782dc

    • Size

      1.6MB

    • MD5

      88e3ed5a222c15de07ea09cc8e0f6c30

    • SHA1

      47a2edca4ffd880dac1febcaeeeac43d46cbd219

    • SHA256

      bfa4ee6a3152b946f6e02a58ce8aa2daa96bd29d5438195263a8eac387c782dc

    • SHA512

      e2feaa504b80d2363957c631b26f8e7c3f9a9e573b76692e9d471260dc248775ead0fada7b75acf4fa215fa262d750c240d995962647f1395bafbed1912622e9

    • SSDEEP

      49152:GqhJEr8AS9N8dW/snJ7v03v2YJTs0UEtIXNbhS:3E4idW/snJ7XYJTs0UCIXz

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks