General

  • Target

    setup.exe

  • Size

    1.0MB

  • Sample

    230420-anxbzagc2w

  • MD5

    52c59814f9afe3100717fda753e7b449

  • SHA1

    0b794308d4c33a28eb7417167465bedf7c3e72da

  • SHA256

    a523ace3b13fbdc8f474e6272c4044882e8da73c3ed1a910a5e5adfc14ce2827

  • SHA512

    65cf7eef587ecaf2c7e7bf928d97bb97ea17738a7af22576d1c6266b2d995d08d4b005107b0244ee889117a9c73e9d2503c9ec4c2c1b33525b525e7c1eede929

  • SSDEEP

    24576:RymNnOdSVaslhHC61sKXkjzIQp77oVE9:EiPlhHDiT/I0CE

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      setup.exe

    • Size

      1.0MB

    • MD5

      52c59814f9afe3100717fda753e7b449

    • SHA1

      0b794308d4c33a28eb7417167465bedf7c3e72da

    • SHA256

      a523ace3b13fbdc8f474e6272c4044882e8da73c3ed1a910a5e5adfc14ce2827

    • SHA512

      65cf7eef587ecaf2c7e7bf928d97bb97ea17738a7af22576d1c6266b2d995d08d4b005107b0244ee889117a9c73e9d2503c9ec4c2c1b33525b525e7c1eede929

    • SSDEEP

      24576:RymNnOdSVaslhHC61sKXkjzIQp77oVE9:EiPlhHDiT/I0CE

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks