General

  • Target

    6f87dcb300744015b026f4e7236c8951496bbdbfb75842f528a1536e884ceeb6

  • Size

    1.1MB

  • Sample

    230422-p896wsgf4s

  • MD5

    415d8365eb7e85343cc849bfb50f8f7d

  • SHA1

    80d505e3f4af3909eb325fd07a8753dc71bd8f63

  • SHA256

    6f87dcb300744015b026f4e7236c8951496bbdbfb75842f528a1536e884ceeb6

  • SHA512

    cc6d86e18f90e8284b494549d514fd9dc3bc609b2dba82f6f4da1aea46379a325a8a13bc7dd655b308a9e4fad336441ebdab0ce4c661c10c766062ecac384eda

  • SSDEEP

    24576:vyl4h/SLvF3C6MC3awRTLEV49/WImGbb52SZ5y2q:6USLdy6MCKw2iNz/5z

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      6f87dcb300744015b026f4e7236c8951496bbdbfb75842f528a1536e884ceeb6

    • Size

      1.1MB

    • MD5

      415d8365eb7e85343cc849bfb50f8f7d

    • SHA1

      80d505e3f4af3909eb325fd07a8753dc71bd8f63

    • SHA256

      6f87dcb300744015b026f4e7236c8951496bbdbfb75842f528a1536e884ceeb6

    • SHA512

      cc6d86e18f90e8284b494549d514fd9dc3bc609b2dba82f6f4da1aea46379a325a8a13bc7dd655b308a9e4fad336441ebdab0ce4c661c10c766062ecac384eda

    • SSDEEP

      24576:vyl4h/SLvF3C6MC3awRTLEV49/WImGbb52SZ5y2q:6USLdy6MCKw2iNz/5z

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks