General

  • Target

    8f2f00605d9ac5a7d7d040111f426efe4d8d9d95722b970757382e835ac7b616

  • Size

    1.9MB

  • Sample

    240321-wwc4ysed88

  • MD5

    34c1a1b30c37a96a76f01959fb7ca36c

  • SHA1

    9137e1f40c357e91f7208d2659b432c6885b8c3e

  • SHA256

    8f2f00605d9ac5a7d7d040111f426efe4d8d9d95722b970757382e835ac7b616

  • SHA512

    8fb81b5566f067d44f6bdce5de9c6da5e622460cdfe00ae7908bcb1da7abd9417a6476d213cb70d3d1bdd48fc7ecf2d7ff3205e5b075fe8a69b68117eea1502c

  • SSDEEP

    49152:5ks5d4CAQn81YHgkqtI/30GnXrlVSEyH:5157AQn81YAkJ/30GXJgEyH

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Targets

    • Target

      8f2f00605d9ac5a7d7d040111f426efe4d8d9d95722b970757382e835ac7b616

    • Size

      1.9MB

    • MD5

      34c1a1b30c37a96a76f01959fb7ca36c

    • SHA1

      9137e1f40c357e91f7208d2659b432c6885b8c3e

    • SHA256

      8f2f00605d9ac5a7d7d040111f426efe4d8d9d95722b970757382e835ac7b616

    • SHA512

      8fb81b5566f067d44f6bdce5de9c6da5e622460cdfe00ae7908bcb1da7abd9417a6476d213cb70d3d1bdd48fc7ecf2d7ff3205e5b075fe8a69b68117eea1502c

    • SSDEEP

      49152:5ks5d4CAQn81YHgkqtI/30GnXrlVSEyH:5157AQn81YAkJ/30GXJgEyH

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks