General

  • Target

    6e610928e757c6108cbf9aa90a09a392c98897b65f97554000894ce178c0784c

  • Size

    1.8MB

  • Sample

    240427-jajcmaee2x

  • MD5

    c41182b4eed82616ae5cf50361fae1a8

  • SHA1

    2be76ee1566f774c61fa86f68eb9037559aa40e9

  • SHA256

    6e610928e757c6108cbf9aa90a09a392c98897b65f97554000894ce178c0784c

  • SHA512

    df6e6c937ba6f69ac7fd73a4ef0ce5c3964fb436c40721421658ef731cf68e9e7bad73b95ea807058f45badc445550267a1609994146e37038c26c339598e980

  • SSDEEP

    49152:cac0Pq8hgezFIb1BWBJGKVYVcWAbNXVABVayoCvk5yGPY+u2K:caJPqWzxI1AFVtb6Vay9c5LPY

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Targets

    • Target

      6e610928e757c6108cbf9aa90a09a392c98897b65f97554000894ce178c0784c

    • Size

      1.8MB

    • MD5

      c41182b4eed82616ae5cf50361fae1a8

    • SHA1

      2be76ee1566f774c61fa86f68eb9037559aa40e9

    • SHA256

      6e610928e757c6108cbf9aa90a09a392c98897b65f97554000894ce178c0784c

    • SHA512

      df6e6c937ba6f69ac7fd73a4ef0ce5c3964fb436c40721421658ef731cf68e9e7bad73b95ea807058f45badc445550267a1609994146e37038c26c339598e980

    • SSDEEP

      49152:cac0Pq8hgezFIb1BWBJGKVYVcWAbNXVABVayoCvk5yGPY+u2K:caJPqWzxI1AFVtb6Vay9c5LPY

    Score
    10/10
    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Tasks