General

  • Target

    f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718

  • Size

    425KB

  • Sample

    231210-vb1h3sgcfk

  • MD5

    b0aa0a177f2193739bb3ee81245dbe67

  • SHA1

    683cc9723ede300b072d2124c031d7dd0a0cf472

  • SHA256

    f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718

  • SHA512

    cccfab49f7669895f6404417299ca022876f2e904e3cb25eb6d0af00b46e56ceebf1f9e3ac04c427bce4cac423e7d77f28a57e1f435624777ba8b51d45ccd692

  • SSDEEP

    12288:bSIX87D533xNzxb9XdEpxDYsF4m98uH+WYcCF:S7D533xNzl9N+YOD/CF

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.11

C2

http://shohetrc.com

http://sibcomputer.ru

http://tve-mail.com

Attributes
  • install_dir

    d4dd819322

  • install_file

    Utsysc.exe

  • strings_key

    8419b3024d6f72beef8af6915e592308

  • url_paths

    /forum/index.php

rc4.plain

Targets

    • Target

      f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718

    • Size

      425KB

    • MD5

      b0aa0a177f2193739bb3ee81245dbe67

    • SHA1

      683cc9723ede300b072d2124c031d7dd0a0cf472

    • SHA256

      f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718

    • SHA512

      cccfab49f7669895f6404417299ca022876f2e904e3cb25eb6d0af00b46e56ceebf1f9e3ac04c427bce4cac423e7d77f28a57e1f435624777ba8b51d45ccd692

    • SSDEEP

      12288:bSIX87D533xNzxb9XdEpxDYsF4m98uH+WYcCF:S7D533xNzl9N+YOD/CF

    Score
    10/10
    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks