General

  • Target

    b9167b1383f50b505263b23efec2437d4f07ef2b0b6c843b008161c0b319a3ec

  • Size

    490KB

  • Sample

    230506-ay7wfsfc54

  • MD5

    4d774fc8e6f04b3ae2fa354c05cb26c4

  • SHA1

    ae76cae1c43695ff6678fcde9175bb089a88a2bf

  • SHA256

    b9167b1383f50b505263b23efec2437d4f07ef2b0b6c843b008161c0b319a3ec

  • SHA512

    96b9bb3d0a27d01690c5c4ee8b1b770122e105dd6f30bbd02ffe802193d8fd6562c683cb3996179a66674aab7b4737cfa023b8dc905df01101158bcfddee3354

  • SSDEEP

    12288:+Mrvy90F4k4TeYGKqAnITVCsbCnp4+qP/P:ty6d4K9LfTAs0p45PX

Malware Config

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Targets

    • Target

      b9167b1383f50b505263b23efec2437d4f07ef2b0b6c843b008161c0b319a3ec

    • Size

      490KB

    • MD5

      4d774fc8e6f04b3ae2fa354c05cb26c4

    • SHA1

      ae76cae1c43695ff6678fcde9175bb089a88a2bf

    • SHA256

      b9167b1383f50b505263b23efec2437d4f07ef2b0b6c843b008161c0b319a3ec

    • SHA512

      96b9bb3d0a27d01690c5c4ee8b1b770122e105dd6f30bbd02ffe802193d8fd6562c683cb3996179a66674aab7b4737cfa023b8dc905df01101158bcfddee3354

    • SSDEEP

      12288:+Mrvy90F4k4TeYGKqAnITVCsbCnp4+qP/P:ty6d4K9LfTAs0p45PX

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks