General

  • Target

    70f41addc90962e8333ac22f5aff68c6cceef6f9f41efd0f8b16e8e3954b6cab

  • Size

    1.1MB

  • Sample

    230419-p6bkjsaf26

  • MD5

    8e9a2ccd71929b79b42c7355f5474476

  • SHA1

    c06371136ee4e7f9f2af0d043222fe56e0a72a15

  • SHA256

    70f41addc90962e8333ac22f5aff68c6cceef6f9f41efd0f8b16e8e3954b6cab

  • SHA512

    049d13618b8c85648c90e254a1164e137ba62c46a77f38676aa48b855a5c9047505c4a84bcbb4ac4c2492c29d7e104f7df77a4ce9e2fecdaf09f50d81d65dc01

  • SSDEEP

    24576:cyntwrLM4Xm+xwqybpeegz687ZjLeBbCsB/4:Ltwc4Xm+x3WYegzDeBbCsB/

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

aurora

C2

89.208.103.78:8081

Targets

    • Target

      70f41addc90962e8333ac22f5aff68c6cceef6f9f41efd0f8b16e8e3954b6cab

    • Size

      1.1MB

    • MD5

      8e9a2ccd71929b79b42c7355f5474476

    • SHA1

      c06371136ee4e7f9f2af0d043222fe56e0a72a15

    • SHA256

      70f41addc90962e8333ac22f5aff68c6cceef6f9f41efd0f8b16e8e3954b6cab

    • SHA512

      049d13618b8c85648c90e254a1164e137ba62c46a77f38676aa48b855a5c9047505c4a84bcbb4ac4c2492c29d7e104f7df77a4ce9e2fecdaf09f50d81d65dc01

    • SSDEEP

      24576:cyntwrLM4Xm+xwqybpeegz687ZjLeBbCsB/4:Ltwc4Xm+x3WYegzDeBbCsB/

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Modifies Windows Defender Real-time Protection settings

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks