General

  • Target

    Setup.exe

  • Size

    783.8MB

  • Sample

    231207-zbyrpsfd73

  • MD5

    8d9c7a1b7ffba697169f3186003b679a

  • SHA1

    ede6be08abd60545284520e2951ae1f5fada14d9

  • SHA256

    0b542c6e0cd48f9ddc6fc6420eed1b3e16db89a698c17af5a8c245ea7710b7eb

  • SHA512

    e5d524bd9813dddd4d572bf294dddc9ea682f7b5d73e88d8d93b33454bfd79c091e13e08015ec95a7b0fa186ab31c05d800a904cabf8278be84d5d61ced72989

  • SSDEEP

    1572864:ilRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRo:7

Malware Config

Extracted

Family

amadey

Version

4.13

C2

http://185.172.128.5

Attributes
  • install_dir

    4fdb51ccdc

  • install_file

    Utsysc.exe

  • strings_key

    11bb398ff31ee80d2c37571aecd1d36d

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Extracted

Family

amadey

C2

http://185.172.128.5

Attributes
  • strings_key

    11bb398ff31ee80d2c37571aecd1d36d

  • url_paths

    /v8sjh3hs8/index.php

rc4.plain

Extracted

Family

lumma

C2

http://slantrearperiosdew.pw/api

http://laborermemorandumjes.pw/api

Targets

    • Target

      Setup.exe

    • Size

      783.8MB

    • MD5

      8d9c7a1b7ffba697169f3186003b679a

    • SHA1

      ede6be08abd60545284520e2951ae1f5fada14d9

    • SHA256

      0b542c6e0cd48f9ddc6fc6420eed1b3e16db89a698c17af5a8c245ea7710b7eb

    • SHA512

      e5d524bd9813dddd4d572bf294dddc9ea682f7b5d73e88d8d93b33454bfd79c091e13e08015ec95a7b0fa186ab31c05d800a904cabf8278be84d5d61ced72989

    • SSDEEP

      1572864:ilRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRSYElRo:7

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Lumma Stealer payload V2

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks