General

  • Target

    c963942b7b60bf1352d07f136ce4d5f0

  • Size

    453KB

  • Sample

    231203-tzm28adb91

  • MD5

    c963942b7b60bf1352d07f136ce4d5f0

  • SHA1

    7bafedd3874b3f1ebc6d668ee90fa8f58a020370

  • SHA256

    29b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3

  • SHA512

    ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb

  • SSDEEP

    6144:JWithdJ7T88JJdDkELkbO+IAGkqOjIHROoSvdZ1m4TzzWCB/ZiaM:Mi1JfbJJd4O+IAGFcSROZZ1lD7B8aM

Malware Config

Extracted

Family

amadey

C2

http://77.91.76.37

Attributes
  • strings_key

    c736fd5bdd26ef77013837dee2004742

  • url_paths

    /g8samsA2/index.php

rc4.plain

Extracted

Family

amadey

Version

4.13

C2

http://77.91.76.37

Attributes
  • install_dir

    c508585d38

  • install_file

    Utsysc.exe

  • strings_key

    c736fd5bdd26ef77013837dee2004742

  • url_paths

    /g8samsA2/index.php

rc4.plain

Targets

    • Target

      c963942b7b60bf1352d07f136ce4d5f0

    • Size

      453KB

    • MD5

      c963942b7b60bf1352d07f136ce4d5f0

    • SHA1

      7bafedd3874b3f1ebc6d668ee90fa8f58a020370

    • SHA256

      29b841e7b3965ad49e90253946da782bd0c82c42691f3d02811c75ae08df76f3

    • SHA512

      ff1673b3a8df1a25c8dafc1b21ff3ac72b917d51497d447992e3143f58c5df2815fcc89d506a0af6cca7f92b8f065d4e3143bc423f17feae26d68b527e977ccb

    • SSDEEP

      6144:JWithdJ7T88JJdDkELkbO+IAGkqOjIHROoSvdZ1m4TzzWCB/ZiaM:Mi1JfbJJd4O+IAGFcSROZZ1lD7B8aM

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks