General

  • Target

    1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4

  • Size

    9.2MB

  • Sample

    240325-fga32sgd89

  • MD5

    6ff07f91eec875d0a044c73d4ad89b66

  • SHA1

    7a9fe53800e419a027e899e84da5037f80bcb942

  • SHA256

    1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4

  • SHA512

    8f249f8362aa93696a8c75e46c4ace222198cd52cfec1abe5b5d19e1257e610228d15ff36628cd9ab0a9202b27c6380de48e6aa09605d795b4bdcee42e5c0953

  • SSDEEP

    196608:O+yBLycnfg7zk5nOz9UToMWnYuz1gZgc1nyDWeyHy:ug7zk5n4MWnYuR6gcMDWPS

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://ruspyc.top

Attributes
  • install_dir

    5027aaabaf

  • install_file

    Dctooux.exe

  • strings_key

    ea32980f4b5f2367967b03fa80659f80

  • url_paths

    /j4Fvskd3/index.php

rc4.plain

Targets

    • Target

      1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4

    • Size

      9.2MB

    • MD5

      6ff07f91eec875d0a044c73d4ad89b66

    • SHA1

      7a9fe53800e419a027e899e84da5037f80bcb942

    • SHA256

      1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4

    • SHA512

      8f249f8362aa93696a8c75e46c4ace222198cd52cfec1abe5b5d19e1257e610228d15ff36628cd9ab0a9202b27c6380de48e6aa09605d795b4bdcee42e5c0953

    • SSDEEP

      196608:O+yBLycnfg7zk5nOz9UToMWnYuz1gZgc1nyDWeyHy:ug7zk5n4MWnYuR6gcMDWPS

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks