General

  • Target

    c1e4d8cca13adfcd4b7baa0eaf520972.exe

  • Size

    1.2MB

  • Sample

    230418-vp9nxach77

  • MD5

    c1e4d8cca13adfcd4b7baa0eaf520972

  • SHA1

    95e1976b0fdb0e7caf240faaa896ce42624a0cb4

  • SHA256

    b71c9fa76559692a04807f0e669631f42a65f210bd0d043735fc945cb3155a15

  • SHA512

    f98f675971588d79e75e8abfd17aa3c692e48b0223a60bb98e2a98cb686c0e5d53882e415b1f5d69ea07267ef08631b4932bc520b488feee2c59df07d6dbe7de

  • SSDEEP

    24576:Dy7bhfU7DmI1OueY0um4TvMMDpm660eNi8qQscTHn238lExZYG2w:W3hf0x1HetzOpm60k8gcTnmTxGV

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      c1e4d8cca13adfcd4b7baa0eaf520972.exe

    • Size

      1.2MB

    • MD5

      c1e4d8cca13adfcd4b7baa0eaf520972

    • SHA1

      95e1976b0fdb0e7caf240faaa896ce42624a0cb4

    • SHA256

      b71c9fa76559692a04807f0e669631f42a65f210bd0d043735fc945cb3155a15

    • SHA512

      f98f675971588d79e75e8abfd17aa3c692e48b0223a60bb98e2a98cb686c0e5d53882e415b1f5d69ea07267ef08631b4932bc520b488feee2c59df07d6dbe7de

    • SSDEEP

      24576:Dy7bhfU7DmI1OueY0um4TvMMDpm660eNi8qQscTHn238lExZYG2w:W3hf0x1HetzOpm60k8gcTnmTxGV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks