General

  • Target

    c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b

  • Size

    388KB

  • Sample

    240315-fggktsaf93

  • MD5

    0de19cd17462ea79db1a5e5fd1d7f59f

  • SHA1

    d2b313dcfbda9a04475fc01182336b52846bbe3b

  • SHA256

    c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b

  • SHA512

    0aecaaa2d8488c3150b2349c260782c13619c5b871f7559496da8fa53e8a18a3fff39603d65516f53709c95108672fd08da8a1249b58aaba92c19ad80411d40c

  • SSDEEP

    6144:xw5S4d8nVyt7UcbfbXoAZvKAHiq7bSVXVU/OooMQEqChuiTAOxiMd:+5B/Uczb4AZvKAHuO/YEJus

Malware Config

Extracted

Family

amadey

Version

4.18

Attributes
  • install_dir

    154561dcbf

  • install_file

    Dctooux.exe

  • strings_key

    2cd47fa043c815e1a033c67832f3c6a5

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Targets

    • Target

      c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b

    • Size

      388KB

    • MD5

      0de19cd17462ea79db1a5e5fd1d7f59f

    • SHA1

      d2b313dcfbda9a04475fc01182336b52846bbe3b

    • SHA256

      c7a85c09379538ca0f5e856eb5dcf63d949c9d1841e12cb8c5fd42c780f1fe3b

    • SHA512

      0aecaaa2d8488c3150b2349c260782c13619c5b871f7559496da8fa53e8a18a3fff39603d65516f53709c95108672fd08da8a1249b58aaba92c19ad80411d40c

    • SSDEEP

      6144:xw5S4d8nVyt7UcbfbXoAZvKAHiq7bSVXVU/OooMQEqChuiTAOxiMd:+5B/Uczb4AZvKAHuO/YEJus

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks