General

  • Target

    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285.exe

  • Size

    430KB

  • Sample

    231202-jcpmesae44

  • MD5

    fac43cfef66cbe7a612f11ab8acbce9f

  • SHA1

    ecbe7847537433957097edf20659b532ef9f8819

  • SHA256

    2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

  • SHA512

    44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

  • SSDEEP

    6144:5UNHaj0eTOkkyYrfKFoWTWbvYK8jHCw1E9BO21NE6iYSd3Sg/x:x0SfPFogWbyHRkBOuWY2Z5

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.11

C2

http://shohetrc.com

http://sibcomputer.ru

http://tve-mail.com

Attributes
  • install_dir

    d4dd819322

  • install_file

    Utsysc.exe

  • strings_key

    8419b3024d6f72beef8af6915e592308

  • url_paths

    /forum/index.php

rc4.plain

Targets

    • Target

      2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285.exe

    • Size

      430KB

    • MD5

      fac43cfef66cbe7a612f11ab8acbce9f

    • SHA1

      ecbe7847537433957097edf20659b532ef9f8819

    • SHA256

      2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285

    • SHA512

      44f668b81704d6cf1a435ed4072e00d58ac4b98dae6fc1b069fc3c0da77553667fbc6f1c0c8db7084ae4b93bc6478e6e95b3933c6e3ed44d3ada60fbe99a127d

    • SSDEEP

      6144:5UNHaj0eTOkkyYrfKFoWTWbvYK8jHCw1E9BO21NE6iYSd3Sg/x:x0SfPFogWbyHRkBOuWY2Z5

    Score
    10/10
    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks