General

  • Target

    file.exe

  • Size

    607KB

  • Sample

    230502-lyzqmacd7t

  • MD5

    fec1bb333482a2e245660c0e4026f85d

  • SHA1

    a08544a217c47a3d77292f013afa6d84f93f0821

  • SHA256

    f90cac94e15dcd83102e845c4e1e10e244506615157f19b8dd816c1ce32fca1e

  • SHA512

    f283cf4815219bf20672f86cfd81aa4eb1813863e168f0f21e44033d86d4df1d8e55e6ee214f293dd6734e33f24d556a8694b7d0b0c239fcc8762cae90016c9f

  • SSDEEP

    12288:QTg6UFR4EGWlEUkx9RCDwGWzjuGW0IRlHoEM+fK:QExEWOXkqyGpKlo

Malware Config

Extracted

Family

amadey

Version

3.70

C2

tadogem.com/dF30Hn4m/index.php

Extracted

Family

systembc

C2

65.21.119.52:4277

localhost.exchange:4277

Targets

    • Target

      file.exe

    • Size

      607KB

    • MD5

      fec1bb333482a2e245660c0e4026f85d

    • SHA1

      a08544a217c47a3d77292f013afa6d84f93f0821

    • SHA256

      f90cac94e15dcd83102e845c4e1e10e244506615157f19b8dd816c1ce32fca1e

    • SHA512

      f283cf4815219bf20672f86cfd81aa4eb1813863e168f0f21e44033d86d4df1d8e55e6ee214f293dd6734e33f24d556a8694b7d0b0c239fcc8762cae90016c9f

    • SSDEEP

      12288:QTg6UFR4EGWlEUkx9RCDwGWzjuGW0IRlHoEM+fK:QExEWOXkqyGpKlo

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • SystemBC

      SystemBC is a proxy and remote administration tool first seen in 2019.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks