General

  • Target

    72745ce48934ea5f44c6f6ccbaebf613367590f8af00513ec8f540136202fd44

  • Size

    486KB

  • Sample

    240618-3za74aterq

  • MD5

    5808a34c3d3fb88e01a3c0fbb34d1c07

  • SHA1

    5d3375dfb8c1e86b061f217c4a0a5f9f79214e6c

  • SHA256

    72745ce48934ea5f44c6f6ccbaebf613367590f8af00513ec8f540136202fd44

  • SHA512

    dbb449249dcfbfdb1a313c1441054a5b60883f26e47bebec4f4c95187983e6b6f910e2a7d5b4493d420958e325c2943373fe6a33ac3c97db1a858b3406cf0261

  • SSDEEP

    6144:PL2TRiMZCREab39QFkTMHCNbOhwTnsOr//kkFbj7HPoyG3:P6YMghaFkT6C1OhwTsaHkkFbe

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Targets

    • Target

      72745ce48934ea5f44c6f6ccbaebf613367590f8af00513ec8f540136202fd44

    • Size

      486KB

    • MD5

      5808a34c3d3fb88e01a3c0fbb34d1c07

    • SHA1

      5d3375dfb8c1e86b061f217c4a0a5f9f79214e6c

    • SHA256

      72745ce48934ea5f44c6f6ccbaebf613367590f8af00513ec8f540136202fd44

    • SHA512

      dbb449249dcfbfdb1a313c1441054a5b60883f26e47bebec4f4c95187983e6b6f910e2a7d5b4493d420958e325c2943373fe6a33ac3c97db1a858b3406cf0261

    • SSDEEP

      6144:PL2TRiMZCREab39QFkTMHCNbOhwTnsOr//kkFbj7HPoyG3:P6YMghaFkT6C1OhwTsaHkkFbe

    Score
    10/10
    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks