General

  • Target

    379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5

  • Size

    1.1MB

  • Sample

    230419-25hzfsdh68

  • MD5

    b043e0bddda6a78fcf7c6438fa9fc51c

  • SHA1

    17ccba5ddef82cf4bec31af3208f065df5a23341

  • SHA256

    379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5

  • SHA512

    b771ac8538ced141ec5f7fbc3e9241217759c89ccfc16ca5af93e4d4e08ccbf02ae51074b65fabff069d67e6af2a2f9c9d0d6275274ba75259a45218b8ffb353

  • SSDEEP

    24576:Eymiks+BkOVT3cFIu8nxAH+aFd4qdnhq0BTIR:TmihiPTcF78nxfaFZho

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5

    • Size

      1.1MB

    • MD5

      b043e0bddda6a78fcf7c6438fa9fc51c

    • SHA1

      17ccba5ddef82cf4bec31af3208f065df5a23341

    • SHA256

      379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5

    • SHA512

      b771ac8538ced141ec5f7fbc3e9241217759c89ccfc16ca5af93e4d4e08ccbf02ae51074b65fabff069d67e6af2a2f9c9d0d6275274ba75259a45218b8ffb353

    • SSDEEP

      24576:Eymiks+BkOVT3cFIu8nxAH+aFd4qdnhq0BTIR:TmihiPTcF78nxfaFZho

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks