General

  • Target

    ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e

  • Size

    1.0MB

  • Sample

    230424-shw35aec9w

  • MD5

    facd0b118db0fef2a438a9f9b79673bd

  • SHA1

    ccac7ff0ab6cabc97f35280598574cb96ddf9dab

  • SHA256

    ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e

  • SHA512

    fcc671a126ee27c2441d92a671390fce78ec07d584c2e61671a9133e0a08f99cd82cb1b8cc26b1266dbe8ba0fc49ca0a1a128def6f9672f63fc9eb96d5a8ae0c

  • SSDEEP

    24576:gyr16aBeE9AtjsxLW8RYFgIResm8ZOq7jVPWHJJEBP:nrxBe6KWW8RYFg4eP8ZOq7hQJEB

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e

    • Size

      1.0MB

    • MD5

      facd0b118db0fef2a438a9f9b79673bd

    • SHA1

      ccac7ff0ab6cabc97f35280598574cb96ddf9dab

    • SHA256

      ff1678a86e742b8b596b7293cf4bd74b5ad23906387e752b11d91eed5a8d2e4e

    • SHA512

      fcc671a126ee27c2441d92a671390fce78ec07d584c2e61671a9133e0a08f99cd82cb1b8cc26b1266dbe8ba0fc49ca0a1a128def6f9672f63fc9eb96d5a8ae0c

    • SSDEEP

      24576:gyr16aBeE9AtjsxLW8RYFgIResm8ZOq7jVPWHJJEBP:nrxBe6KWW8RYFg4eP8ZOq7hQJEB

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks