General

  • Target

    6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05

  • Size

    1.7MB

  • Sample

    240510-ltq8pafh6y

  • MD5

    7bc3ca90ce9e0262f2feeb3ec0db93a7

  • SHA1

    6032e4e1a49d26cab45b932f8a6e9ef8f0c2a7db

  • SHA256

    6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05

  • SHA512

    2f1813943a2ca91416930b903c5f23bde2a0c78d6c3b6f49d53bf96733c76edf1baf196237a5b311f0ec48660f1df823457f7544da7bf7e27ee6495510206b7d

  • SSDEEP

    49152:aqLmpDKQnWFQbxq4/4FpWXsuUE17s+fk8:aNpORE46QC7rc8

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://193.233.132.139

Attributes
  • install_dir

    5454e6f062

  • install_file

    explorta.exe

  • strings_key

    c7a869c5ba1d72480093ec207994e2bf

  • url_paths

    /sev56rkm/index.php

rc4.plain

Targets

    • Target

      6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05

    • Size

      1.7MB

    • MD5

      7bc3ca90ce9e0262f2feeb3ec0db93a7

    • SHA1

      6032e4e1a49d26cab45b932f8a6e9ef8f0c2a7db

    • SHA256

      6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05

    • SHA512

      2f1813943a2ca91416930b903c5f23bde2a0c78d6c3b6f49d53bf96733c76edf1baf196237a5b311f0ec48660f1df823457f7544da7bf7e27ee6495510206b7d

    • SSDEEP

      49152:aqLmpDKQnWFQbxq4/4FpWXsuUE17s+fk8:aNpORE46QC7rc8

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks