Resubmissions

18/09/2023, 15:52

230918-tbhslacg29 10

18/09/2023, 15:49

230918-s9k5yacg25 3

General

  • Target

    Setup_123_Passwords_Full.rar

  • Size

    20.4MB

  • Sample

    230918-tbhslacg29

  • MD5

    ff60a584e612ba7221f4dd6731024b91

  • SHA1

    957d383f8301ff8be17ba9a8acc747103a6158ff

  • SHA256

    2d9e44c989b972f37ce892834f019ffe77a16b2e90537b3b306f91ce1e09adba

  • SHA512

    8740b5b40771c6a53eaf017b0ef94e5089149e3b0e084609f8fcf4bdd8ebfde6e2a1624727a502a42c9ca458bc5e6fe0f3c60df32748a3d688363177d9517715

  • SSDEEP

    393216:GBiGilmyltshQv/RN/ay0k2zwnprnwjSLKGaXKBCFmqbDgrPQYEp/:Gwxkpi/RN/ayz2U0WoKBCFmqSO1

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://45.9.74.5/b7djSDcPcZ/index.php

Attributes
  • install_dir

    a304d35d74

  • install_file

    yiueea.exe

  • strings_key

    9af57d7284111fb0465ea6e552cde914

rc4.plain

Targets

    • Target

      Setup_123_Passwords_Full.rar

    • Size

      20.4MB

    • MD5

      ff60a584e612ba7221f4dd6731024b91

    • SHA1

      957d383f8301ff8be17ba9a8acc747103a6158ff

    • SHA256

      2d9e44c989b972f37ce892834f019ffe77a16b2e90537b3b306f91ce1e09adba

    • SHA512

      8740b5b40771c6a53eaf017b0ef94e5089149e3b0e084609f8fcf4bdd8ebfde6e2a1624727a502a42c9ca458bc5e6fe0f3c60df32748a3d688363177d9517715

    • SSDEEP

      393216:GBiGilmyltshQv/RN/ay0k2zwnprnwjSLKGaXKBCFmqbDgrPQYEp/:Gwxkpi/RN/ayz2U0WoKBCFmqSO1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks