Resubmissions

07-08-2023 02:13

230807-cnwfsada23 10

04-08-2023 11:08

230804-m8n8babg4s 10

General

  • Target

    d35d55bb74a7cf4349e2fa4a92839e2a88f17a1fee9725801d0d97b2bf0d311c

  • Size

    1.6MB

  • Sample

    230804-m8n8babg4s

  • MD5

    952d825a264745bb52b6977ba5983568

  • SHA1

    627a0a841c2fe194dd54f9ec6b0c1231d7da135f

  • SHA256

    d35d55bb74a7cf4349e2fa4a92839e2a88f17a1fee9725801d0d97b2bf0d311c

  • SHA512

    461579e1b94049107a738d74433961b865a536c9e2896f708a3b70026ea18712db6bf57c0c62173659ed8f79ffb43beee0549a45858e401c3ee2f2a8a6eae73f

  • SSDEEP

    24576:vZNFBKNlMaSOHEB2eXSbSgAaCOHOpxeRpeJphGf4F3xERjf7sI:vZNKJSR5iAaDaeRpeJpof4F3xERjTsI

Malware Config

Extracted

Family

amadey

Version

3.86

C2

45.9.74.182/b7djSDcPcZ/index.php

Targets

    • Target

      d35d55bb74a7cf4349e2fa4a92839e2a88f17a1fee9725801d0d97b2bf0d311c

    • Size

      1.6MB

    • MD5

      952d825a264745bb52b6977ba5983568

    • SHA1

      627a0a841c2fe194dd54f9ec6b0c1231d7da135f

    • SHA256

      d35d55bb74a7cf4349e2fa4a92839e2a88f17a1fee9725801d0d97b2bf0d311c

    • SHA512

      461579e1b94049107a738d74433961b865a536c9e2896f708a3b70026ea18712db6bf57c0c62173659ed8f79ffb43beee0549a45858e401c3ee2f2a8a6eae73f

    • SSDEEP

      24576:vZNFBKNlMaSOHEB2eXSbSgAaCOHOpxeRpeJphGf4F3xERjf7sI:vZNKJSR5iAaDaeRpeJpof4F3xERjTsI

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks