General

  • Target

    6e079a402eb7f20821b8dbd11ba81c006e81ddf10196c1ceb899dd082f10801a

  • Size

    950KB

  • Sample

    230423-zh1vmsfg67

  • MD5

    1cd670b5ea1a7af803f401209c4daedc

  • SHA1

    83b54effc731188a76566179b4874f139636aac8

  • SHA256

    6e079a402eb7f20821b8dbd11ba81c006e81ddf10196c1ceb899dd082f10801a

  • SHA512

    d8dc43e7856559721929f7450a061755cd4527a2119d3a7b920190d79dc57fae79b641b54f6d6bd4dc36d4eced970bc8875efbda2b592ba9adb40757c68b16f3

  • SSDEEP

    24576:eytiOzNEzedkG8kBPZWcfiIoWpYWKaYC1OM/pLMLYXs:tweNMedkhwHXp/KLCYM/pLMU

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      6e079a402eb7f20821b8dbd11ba81c006e81ddf10196c1ceb899dd082f10801a

    • Size

      950KB

    • MD5

      1cd670b5ea1a7af803f401209c4daedc

    • SHA1

      83b54effc731188a76566179b4874f139636aac8

    • SHA256

      6e079a402eb7f20821b8dbd11ba81c006e81ddf10196c1ceb899dd082f10801a

    • SHA512

      d8dc43e7856559721929f7450a061755cd4527a2119d3a7b920190d79dc57fae79b641b54f6d6bd4dc36d4eced970bc8875efbda2b592ba9adb40757c68b16f3

    • SSDEEP

      24576:eytiOzNEzedkG8kBPZWcfiIoWpYWKaYC1OM/pLMLYXs:tweNMedkhwHXp/KLCYM/pLMU

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks