General

  • Target

    e5d14033fc40bc51cc66b0bcf7461248bfafbfdb897be954727436dd745e3ed3

  • Size

    1.1MB

  • Sample

    230419-q3r9kacf8t

  • MD5

    be6684ccfeae115871341625bcb4e5a1

  • SHA1

    a7b017a963b178be57d9f7afe8d90b30037500ff

  • SHA256

    e5d14033fc40bc51cc66b0bcf7461248bfafbfdb897be954727436dd745e3ed3

  • SHA512

    567e37a169a803b872e3752ecc93db8d4475ee8e703d6b29cf591a012ab79144747cbf5ad3fe8abeffbfdace000acbf08b32120a967f477141e2e8369eb3267c

  • SSDEEP

    24576:kyX4P/fx3NLZoIdIelCITYUQXkHwraDvz:zX4fx3N/dXlCI0PBa

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

aurora

C2

89.208.103.78:8081

Targets

    • Target

      e5d14033fc40bc51cc66b0bcf7461248bfafbfdb897be954727436dd745e3ed3

    • Size

      1.1MB

    • MD5

      be6684ccfeae115871341625bcb4e5a1

    • SHA1

      a7b017a963b178be57d9f7afe8d90b30037500ff

    • SHA256

      e5d14033fc40bc51cc66b0bcf7461248bfafbfdb897be954727436dd745e3ed3

    • SHA512

      567e37a169a803b872e3752ecc93db8d4475ee8e703d6b29cf591a012ab79144747cbf5ad3fe8abeffbfdace000acbf08b32120a967f477141e2e8369eb3267c

    • SSDEEP

      24576:kyX4P/fx3NLZoIdIelCITYUQXkHwraDvz:zX4fx3N/dXlCI0PBa

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Modifies Windows Defender Real-time Protection settings

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks