General

  • Target

    3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07

  • Size

    490KB

  • Sample

    230505-1h7tmaha9y

  • MD5

    739b6a66d51536c99d15d7304529bd33

  • SHA1

    65608d7e4def49c6a60bfbfe8978a1aeff5e16eb

  • SHA256

    3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07

  • SHA512

    6214876ccc3e7138653f316614417a94273c31fee7c7dac10b39e6a9ae936d170acc1607ff838283c49a8c08eb18a51ce8b62915c04f1f5553001be445030dec

  • SSDEEP

    12288:9Mr+y90sovN/qYD/p6wC7QaxA8/9WCqlzYn:TyJRy8BEaxt8C4Mn

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07

    • Size

      490KB

    • MD5

      739b6a66d51536c99d15d7304529bd33

    • SHA1

      65608d7e4def49c6a60bfbfe8978a1aeff5e16eb

    • SHA256

      3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07

    • SHA512

      6214876ccc3e7138653f316614417a94273c31fee7c7dac10b39e6a9ae936d170acc1607ff838283c49a8c08eb18a51ce8b62915c04f1f5553001be445030dec

    • SSDEEP

      12288:9Mr+y90sovN/qYD/p6wC7QaxA8/9WCqlzYn:TyJRy8BEaxt8C4Mn

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks