General

  • Target

    setup.exe

  • Size

    1.0MB

  • Sample

    230420-anb12agb9y

  • MD5

    4382b0c31f4c6eba5a21fbe88c69fb51

  • SHA1

    7222568b6b989621ccd4836eb56c6c6162b5d46c

  • SHA256

    a587da4bac281de7ad580d061dac4fdd9ef3c3e76daae4d06f235296b2d235bc

  • SHA512

    703484a48651eaa3a1487fb39e92a24e799b260c0c8e9599c342498732dd43c0307a0d0d73d16f4eaf80896438721b1459057b7ac920cad1bf2b3b9824845c1c

  • SSDEEP

    24576:eyn/mx0J2SlMHv6JHkX7vHv8F4TAudbUl:tOtSlIvQWvHv8FMbU

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      setup.exe

    • Size

      1.0MB

    • MD5

      4382b0c31f4c6eba5a21fbe88c69fb51

    • SHA1

      7222568b6b989621ccd4836eb56c6c6162b5d46c

    • SHA256

      a587da4bac281de7ad580d061dac4fdd9ef3c3e76daae4d06f235296b2d235bc

    • SHA512

      703484a48651eaa3a1487fb39e92a24e799b260c0c8e9599c342498732dd43c0307a0d0d73d16f4eaf80896438721b1459057b7ac920cad1bf2b3b9824845c1c

    • SSDEEP

      24576:eyn/mx0J2SlMHv6JHkX7vHv8F4TAudbUl:tOtSlIvQWvHv8FMbU

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks