General

  • Target

    e4261c3173f913225197b1e004adc92c07d6293661d547a1c401e9362fb658c4

  • Size

    1.0MB

  • Sample

    230421-qnby2afg32

  • MD5

    b879093299d88092ca95d8452ab39f25

  • SHA1

    bd21569f87c389a42bfe4a23fb27592467a75329

  • SHA256

    e4261c3173f913225197b1e004adc92c07d6293661d547a1c401e9362fb658c4

  • SHA512

    cab6901d0a64a696f23618d3633a0aae0ed1640a74bcdb3613f0b4c2d2892651723b4c3f63c07fdd087d9b729c28297f447468857e84556939a26deaa247e63b

  • SSDEEP

    24576:aykT/UzYjZfHukgVFp1WPbZYlTdZOTUOqhaP:hUjfEX1WPCDO

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Extracted

Family

laplas

C2

http://45.159.189.105

Attributes
  • api_key

    0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e

Targets

    • Target

      e4261c3173f913225197b1e004adc92c07d6293661d547a1c401e9362fb658c4

    • Size

      1.0MB

    • MD5

      b879093299d88092ca95d8452ab39f25

    • SHA1

      bd21569f87c389a42bfe4a23fb27592467a75329

    • SHA256

      e4261c3173f913225197b1e004adc92c07d6293661d547a1c401e9362fb658c4

    • SHA512

      cab6901d0a64a696f23618d3633a0aae0ed1640a74bcdb3613f0b4c2d2892651723b4c3f63c07fdd087d9b729c28297f447468857e84556939a26deaa247e63b

    • SSDEEP

      24576:aykT/UzYjZfHukgVFp1WPbZYlTdZOTUOqhaP:hUjfEX1WPCDO

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Laplas Clipper

      Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

    • Modifies Windows Defender Real-time Protection settings

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks