General

  • Target

    5db0a8ca4fd59cd7b685f886fc398bc0c6c307360fa0d21fa1dc6cc0c8ec0df5

  • Size

    1.1MB

  • Sample

    230419-ymqd2afa3s

  • MD5

    3afb56b6e6b58cabc2da7933ee893d5c

  • SHA1

    cbfdf16da890af380cc7f2890d1ccb603292e7dd

  • SHA256

    5db0a8ca4fd59cd7b685f886fc398bc0c6c307360fa0d21fa1dc6cc0c8ec0df5

  • SHA512

    06080ca2ebfca134d8539c0403806c6cc41cdeb027ada7dbeb17b308ad6d5b6e7f7b8e1ef7b6497a803d06fe158bead361e019d771894c3ba950d30a1d8944e6

  • SSDEEP

    24576:EyFF+4cZz9n/WP5FfzbN4rdACXGqQQGo9mA5Hcfqi3IV2k:TFF+Zz9KFfzZ4rdFGqQQJ1iqiYY

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      5db0a8ca4fd59cd7b685f886fc398bc0c6c307360fa0d21fa1dc6cc0c8ec0df5

    • Size

      1.1MB

    • MD5

      3afb56b6e6b58cabc2da7933ee893d5c

    • SHA1

      cbfdf16da890af380cc7f2890d1ccb603292e7dd

    • SHA256

      5db0a8ca4fd59cd7b685f886fc398bc0c6c307360fa0d21fa1dc6cc0c8ec0df5

    • SHA512

      06080ca2ebfca134d8539c0403806c6cc41cdeb027ada7dbeb17b308ad6d5b6e7f7b8e1ef7b6497a803d06fe158bead361e019d771894c3ba950d30a1d8944e6

    • SSDEEP

      24576:EyFF+4cZz9n/WP5FfzbN4rdACXGqQQGo9mA5Hcfqi3IV2k:TFF+Zz9KFfzZ4rdFGqQQJ1iqiYY

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks