General

  • Target

    3ea4419957ef572c4ed7cff631e835fe7895900401698b3290746dfecb2c5a57

  • Size

    1.8MB

  • Sample

    240526-vh697seb85

  • MD5

    5682084a213f15d8b4c7fc79a8e93bc2

  • SHA1

    fda8d0c1d7a1111023671c6e57576ec4b4cccb84

  • SHA256

    3ea4419957ef572c4ed7cff631e835fe7895900401698b3290746dfecb2c5a57

  • SHA512

    9e07092d83843cd8c30917ad08f288670e9cab5b612e19a3fac1320e25d18ea6945c53ca59b3052c157aea2346bc7a527938ef6be6d9035616ca98ecef5a1f38

  • SSDEEP

    49152:u5licT/eVijdQlS7g3oGi02w+XDHiEtPVOE31:u5lNeMJQ47g3o5nHiE

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Targets

    • Target

      3ea4419957ef572c4ed7cff631e835fe7895900401698b3290746dfecb2c5a57

    • Size

      1.8MB

    • MD5

      5682084a213f15d8b4c7fc79a8e93bc2

    • SHA1

      fda8d0c1d7a1111023671c6e57576ec4b4cccb84

    • SHA256

      3ea4419957ef572c4ed7cff631e835fe7895900401698b3290746dfecb2c5a57

    • SHA512

      9e07092d83843cd8c30917ad08f288670e9cab5b612e19a3fac1320e25d18ea6945c53ca59b3052c157aea2346bc7a527938ef6be6d9035616ca98ecef5a1f38

    • SSDEEP

      49152:u5licT/eVijdQlS7g3oGi02w+XDHiEtPVOE31:u5lNeMJQ47g3o5nHiE

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

3
T1082

Tasks