General

  • Target

    16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15

  • Size

    951KB

  • Sample

    230423-3jtdqsab2s

  • MD5

    4d5d273d5d3a780478a9ed890004c657

  • SHA1

    f820706999d1f76d9333358c5d332c9dfe9aa921

  • SHA256

    16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15

  • SHA512

    6f6551016ff85740bd5886b1c01f2b63f6df79620bf32a49cbed4e515700693b6c4bf858dce60efd69182bdc872eb9e7fa045d9e068e79e620c7ad4b93041b37

  • SSDEEP

    24576:iyjEOH1vlgIzHuoKsn/EfR79L7wI5xEqrz31+sWHz8y:JlVt1KornsrwI5Cqrz

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15

    • Size

      951KB

    • MD5

      4d5d273d5d3a780478a9ed890004c657

    • SHA1

      f820706999d1f76d9333358c5d332c9dfe9aa921

    • SHA256

      16d26ebd1c09e284d2a6abe4472e160922ca7d9976d6cfb3371a2fa613f4cb15

    • SHA512

      6f6551016ff85740bd5886b1c01f2b63f6df79620bf32a49cbed4e515700693b6c4bf858dce60efd69182bdc872eb9e7fa045d9e068e79e620c7ad4b93041b37

    • SSDEEP

      24576:iyjEOH1vlgIzHuoKsn/EfR79L7wI5xEqrz31+sWHz8y:JlVt1KornsrwI5Cqrz

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks