General

  • Target

    5192b1aaa8f755f0a0dd96836ec80d4f208b0403ff3d755e9a112e7efb1ce68f

  • Size

    791KB

  • Sample

    231011-hcza7afc2s

  • MD5

    12fdbbf78bb7d4caa336ccf05d762bcb

  • SHA1

    9f439bdb93964b183adfe262f6a84f01ab14a959

  • SHA256

    5192b1aaa8f755f0a0dd96836ec80d4f208b0403ff3d755e9a112e7efb1ce68f

  • SHA512

    8f6ff68f56557be44173992f08849754c55b0f0e05c88d36ddaf15de52b42f1e1491d18d73b5862286f4b99d7a92a7c07ce7b7572a6f965c7f67a7784f068b9d

  • SSDEEP

    12288:h8Gb/j8/CReqWgbuqeuofL6KjMV/MnTlmpGscZpUKzJsqp5GkTyov5hXN7n0cAk2:h8GTHWgXML6KW/oUpVq3t1kda5JN79d

Malware Config

Extracted

Family

amadey

Version

3.89

C2

http://193.42.32.29/9bDc8sQ/index.php

Attributes
  • install_dir

    1ff8bec27e

  • install_file

    nhdues.exe

  • strings_key

    2efe1b48925e9abf268903d42284c46b

rc4.plain

Extracted

Family

vidar

Version

6

Botnet

5a1fadccb27cfce506dba962fc85426d

C2

https://steamcommunity.com/profiles/76561199560322242

https://t.me/cahalgo

Attributes
  • profile_id_v2

    5a1fadccb27cfce506dba962fc85426d

  • user_agent

    Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0 uacq

Targets

    • Target

      5192b1aaa8f755f0a0dd96836ec80d4f208b0403ff3d755e9a112e7efb1ce68f

    • Size

      791KB

    • MD5

      12fdbbf78bb7d4caa336ccf05d762bcb

    • SHA1

      9f439bdb93964b183adfe262f6a84f01ab14a959

    • SHA256

      5192b1aaa8f755f0a0dd96836ec80d4f208b0403ff3d755e9a112e7efb1ce68f

    • SHA512

      8f6ff68f56557be44173992f08849754c55b0f0e05c88d36ddaf15de52b42f1e1491d18d73b5862286f4b99d7a92a7c07ce7b7572a6f965c7f67a7784f068b9d

    • SSDEEP

      12288:h8Gb/j8/CReqWgbuqeuofL6KjMV/MnTlmpGscZpUKzJsqp5GkTyov5hXN7n0cAk2:h8GTHWgXML6KW/oUpVq3t1kda5JN79d

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Accesses 2FA software files, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks