General

  • Target

    9881644a4e100c37c4ae17b3e80a6c58e99f0aba18579336da8f4b0477284cea

  • Size

    1.1MB

  • Sample

    230426-vvwz1aag73

  • MD5

    8a25868ccaa1de5b476f0a043c77872b

  • SHA1

    b69da67c8f802ed340caaaf06db0b911927317ed

  • SHA256

    9881644a4e100c37c4ae17b3e80a6c58e99f0aba18579336da8f4b0477284cea

  • SHA512

    9c05a657dfe4f361e53955e4a7395782c45a78bb1fad4867caa3fba738c4150f5f9fda6aa50c4e155254959f12e7c84061906edd243e836bc1a3d9f115a55bea

  • SSDEEP

    24576:eyoXvVOx0LFjTXNm02CRtu2hQjVk2k595:toXvMx0LFjrw7Culk7

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      9881644a4e100c37c4ae17b3e80a6c58e99f0aba18579336da8f4b0477284cea

    • Size

      1.1MB

    • MD5

      8a25868ccaa1de5b476f0a043c77872b

    • SHA1

      b69da67c8f802ed340caaaf06db0b911927317ed

    • SHA256

      9881644a4e100c37c4ae17b3e80a6c58e99f0aba18579336da8f4b0477284cea

    • SHA512

      9c05a657dfe4f361e53955e4a7395782c45a78bb1fad4867caa3fba738c4150f5f9fda6aa50c4e155254959f12e7c84061906edd243e836bc1a3d9f115a55bea

    • SSDEEP

      24576:eyoXvVOx0LFjTXNm02CRtu2hQjVk2k595:toXvMx0LFjrw7Culk7

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks