General

  • Target

    04752bdb1a9d6a72511c0b52aca56ebae9b0e41c2ee08af852945480c98028f9

  • Size

    1.0MB

  • Sample

    230419-qq2x8scf2w

  • MD5

    dece3a91205186cda55e3cd29baa5226

  • SHA1

    0494775d3675450d3dbdd0ba10e71eb18ecdd3bd

  • SHA256

    04752bdb1a9d6a72511c0b52aca56ebae9b0e41c2ee08af852945480c98028f9

  • SHA512

    7218f1f651e3883289a97c68df392e4be6b21dd7c3bcc11e09b89a8e7cc3471aa382176bd1fb8ca764f10900e5c3f42f8d2e71bf9deb283e0fc47572efe1b946

  • SSDEEP

    24576:2yEeU+yKMoyJ6rbxcex6eVe5puhjGXafvJxhQZE8fb+EV:FED9kr1Xxt05puhoaJIT1

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      04752bdb1a9d6a72511c0b52aca56ebae9b0e41c2ee08af852945480c98028f9

    • Size

      1.0MB

    • MD5

      dece3a91205186cda55e3cd29baa5226

    • SHA1

      0494775d3675450d3dbdd0ba10e71eb18ecdd3bd

    • SHA256

      04752bdb1a9d6a72511c0b52aca56ebae9b0e41c2ee08af852945480c98028f9

    • SHA512

      7218f1f651e3883289a97c68df392e4be6b21dd7c3bcc11e09b89a8e7cc3471aa382176bd1fb8ca764f10900e5c3f42f8d2e71bf9deb283e0fc47572efe1b946

    • SSDEEP

      24576:2yEeU+yKMoyJ6rbxcex6eVe5puhjGXafvJxhQZE8fb+EV:FED9kr1Xxt05puhoaJIT1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks