General

  • Target

    c5229ad8431b3266c9cf32baa1bb0569e1fd6e21494319f427aec42e9a1282bf

  • Size

    1.8MB

  • Sample

    240508-whltyaae88

  • MD5

    9d53aa7e30e2703d359cfe7068a3704c

  • SHA1

    b5762e47853ee863b32fb1d72148ef9d20164a71

  • SHA256

    c5229ad8431b3266c9cf32baa1bb0569e1fd6e21494319f427aec42e9a1282bf

  • SHA512

    6bc72686d59dc2104baad7a0ff9455b51bd2419bc7edf27d0cea6e6de0a96949cf2a94b6500c39f6fcaaf9d99af23a880123b8fb6a897881c165f4a4e0484c5a

  • SSDEEP

    49152:P8C831IMB2hBo54K0473Wx/eoahHNDqd3KnUcmwpsYXav3n+8mR:PkDBem0RrahHNDyanpsPcR

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Targets

    • Target

      c5229ad8431b3266c9cf32baa1bb0569e1fd6e21494319f427aec42e9a1282bf

    • Size

      1.8MB

    • MD5

      9d53aa7e30e2703d359cfe7068a3704c

    • SHA1

      b5762e47853ee863b32fb1d72148ef9d20164a71

    • SHA256

      c5229ad8431b3266c9cf32baa1bb0569e1fd6e21494319f427aec42e9a1282bf

    • SHA512

      6bc72686d59dc2104baad7a0ff9455b51bd2419bc7edf27d0cea6e6de0a96949cf2a94b6500c39f6fcaaf9d99af23a880123b8fb6a897881c165f4a4e0484c5a

    • SSDEEP

      49152:P8C831IMB2hBo54K0473Wx/eoahHNDqd3KnUcmwpsYXav3n+8mR:PkDBem0RrahHNDyanpsPcR

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks