General

  • Target

    81e6935cbe42a1ddb75406e4c2b34659cc17c43f36f9899f23e9d5066f8348f0

  • Size

    1.7MB

  • Sample

    240524-an8p1aee6x

  • MD5

    87f9e3213ba24a2d1bf116bf1809b0d1

  • SHA1

    9bad8e8e0aa5815b757635bc57f10436c613f828

  • SHA256

    81e6935cbe42a1ddb75406e4c2b34659cc17c43f36f9899f23e9d5066f8348f0

  • SHA512

    aba6367558b59f9afe8ff3db3b912f11a8a1ec070287af637564c4135e5cd15e385c2be9d9a2db7135542c87214c77fb7002cc39b74bb002068710adad85bb52

  • SSDEEP

    24576:LVh8r8XEPQELU3bEPwTuEYY5h8Hkb5fHbXxd77rytSoPm+YXnCs4jQbmMf/9:JHXP/3bCEjGKtUsoPm+YTUQbRf1

Malware Config

Extracted

Family

amadey

Version

4.20

Botnet

18befc

C2

http://5.42.96.141

Attributes
  • install_dir

    908f070dff

  • install_file

    explorku.exe

  • strings_key

    b25a9385246248a95c600f9a061438e1

  • url_paths

    /go34ko8/index.php

rc4.plain

Targets

    • Target

      81e6935cbe42a1ddb75406e4c2b34659cc17c43f36f9899f23e9d5066f8348f0

    • Size

      1.7MB

    • MD5

      87f9e3213ba24a2d1bf116bf1809b0d1

    • SHA1

      9bad8e8e0aa5815b757635bc57f10436c613f828

    • SHA256

      81e6935cbe42a1ddb75406e4c2b34659cc17c43f36f9899f23e9d5066f8348f0

    • SHA512

      aba6367558b59f9afe8ff3db3b912f11a8a1ec070287af637564c4135e5cd15e385c2be9d9a2db7135542c87214c77fb7002cc39b74bb002068710adad85bb52

    • SSDEEP

      24576:LVh8r8XEPQELU3bEPwTuEYY5h8Hkb5fHbXxd77rytSoPm+YXnCs4jQbmMf/9:JHXP/3bCEjGKtUsoPm+YTUQbRf1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks