General

  • Target

    fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648

  • Size

    1.0MB

  • Sample

    230421-jr19rseg24

  • MD5

    61277d28735d9a1d2e1c6a576374fbcf

  • SHA1

    20a833f2213165ccc1cb85cba18a52878994121a

  • SHA256

    fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648

  • SHA512

    91f154a0fa5883d1ec9c961f84c77ffb2ef7c46eb0a3b8001e12b82aafa869445b4a583bcc540336e22def0f7f83bada2035c8c5c038dfbd18a35fba459a39b2

  • SSDEEP

    24576:EyaSvu86QBc1I8L6Y9PtDzvOfpp3vsrefMl4w531mliN:TxJ/c1IUtfvOfpZUrX4w1

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648

    • Size

      1.0MB

    • MD5

      61277d28735d9a1d2e1c6a576374fbcf

    • SHA1

      20a833f2213165ccc1cb85cba18a52878994121a

    • SHA256

      fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648

    • SHA512

      91f154a0fa5883d1ec9c961f84c77ffb2ef7c46eb0a3b8001e12b82aafa869445b4a583bcc540336e22def0f7f83bada2035c8c5c038dfbd18a35fba459a39b2

    • SSDEEP

      24576:EyaSvu86QBc1I8L6Y9PtDzvOfpp3vsrefMl4w531mliN:TxJ/c1IUtfvOfpZUrX4w1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks