General

  • Target

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

  • Size

    1.5MB

  • Sample

    231123-tnmmbaag27

  • MD5

    32fd90862f9a7732ec49aad05ba343fe

  • SHA1

    473a409ad0d6e896cedfa546c30b16b56355a11f

  • SHA256

    d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

  • SHA512

    6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

  • SSDEEP

    24576:ZQIsq2Q2GOAO4fCCy7gtlkJSfU2qZhGjZRDsKjuRui26a24UzhlMxO+znN:ZQIsq2Q2GOAO4fCZ7YlI2UioKCoi9zhM

Malware Config

Extracted

Family

amadey

Version

4.12

C2

http://brodoyouevenlift.co.za

Attributes
  • install_dir

    ce3eb8f6b2

  • install_file

    Utsysc.exe

  • strings_key

    c5b804d7b4c8a99f5afb89e5203cf3ba

  • url_paths

    /g9sdjScV2/index.php

    /vdhe8ejs3/index.php

rc4.plain

Targets

    • Target

      d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    • Size

      1.5MB

    • MD5

      32fd90862f9a7732ec49aad05ba343fe

    • SHA1

      473a409ad0d6e896cedfa546c30b16b56355a11f

    • SHA256

      d9419bc56421da78118cd511468bbc463bfb2c8d4405e2a6b38956b5a49d10a3

    • SHA512

      6b89f4e1f9874d580f2fe7acede465d7f9c651e57072b6ea02be5b8eaa89a6d97e9dd9d5181c710a3e00a5645806307311c11fb85a280ad2b961a90d63efe6dd

    • SSDEEP

      24576:ZQIsq2Q2GOAO4fCCy7gtlkJSfU2qZhGjZRDsKjuRui26a24UzhlMxO+znN:ZQIsq2Q2GOAO4fCZ7YlI2UioKCoi9zhM

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks