General

  • Target

    155e65ea8e6ecf962ae78503325472bb78dd787d043245cc31ef821b14370ac9

  • Size

    2.2MB

  • Sample

    240112-2svgqafdhq

  • MD5

    8b51bcee6a4f5325e66cdc5fb547937f

  • SHA1

    36dc7b7e24a75dbbbf025adc74cea9bdfa14e66f

  • SHA256

    155e65ea8e6ecf962ae78503325472bb78dd787d043245cc31ef821b14370ac9

  • SHA512

    ddbd2674f9d3a363cb8bc51ab202e73b9d48d1416b217336df05f2f7811db090919dadd79c4b2a6a26b38393129d6b08fbfd773ac93901894fec1eea9489fc04

  • SSDEEP

    49152:MHTU7hl7v7n5J+KrnJgkWPrjF2bIToFCMgtCO2vez+FP:77hp75MKrJjWPwdFCltCO2v5

Malware Config

Extracted

Family

amadey

Version

4.15

C2

http://185.215.113.68

Attributes
  • install_dir

    d887ceb89d

  • install_file

    explorhe.exe

  • strings_key

    7cadc181267fafff9df8503e730d60e1

  • url_paths

    /theme/index.php

rc4.plain

Targets

    • Target

      155e65ea8e6ecf962ae78503325472bb78dd787d043245cc31ef821b14370ac9

    • Size

      2.2MB

    • MD5

      8b51bcee6a4f5325e66cdc5fb547937f

    • SHA1

      36dc7b7e24a75dbbbf025adc74cea9bdfa14e66f

    • SHA256

      155e65ea8e6ecf962ae78503325472bb78dd787d043245cc31ef821b14370ac9

    • SHA512

      ddbd2674f9d3a363cb8bc51ab202e73b9d48d1416b217336df05f2f7811db090919dadd79c4b2a6a26b38393129d6b08fbfd773ac93901894fec1eea9489fc04

    • SSDEEP

      49152:MHTU7hl7v7n5J+KrnJgkWPrjF2bIToFCMgtCO2vez+FP:77hp75MKrJjWPwdFCltCO2v5

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks