General

  • Target

    e7e506b6a558690e6ddb69c5c4c8d4d2728cc909217ba7794d71f957c50d1916

  • Size

    1.8MB

  • Sample

    240726-q3tsds1fqk

  • MD5

    732aee302d7d31b1b7b47102053388af

  • SHA1

    42ffdc6af95c0b39da1a9bae18a1638a8e66c5d9

  • SHA256

    e7e506b6a558690e6ddb69c5c4c8d4d2728cc909217ba7794d71f957c50d1916

  • SHA512

    534cc58ebaea738347dabbb212ec25f4af9bb9acd0d68481b821bdf03ddf223ff1ee1ca745f0f5b52674b57d9d2d8ab386f384af7cf2b177ab054ebe03f93bbf

  • SSDEEP

    49152:wm7AiX20LOQ4RbZYY+ywWKEtvyFmnP7e4z2QKe4F0:wmalCYxFKuygy4qe

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Targets

    • Target

      e7e506b6a558690e6ddb69c5c4c8d4d2728cc909217ba7794d71f957c50d1916

    • Size

      1.8MB

    • MD5

      732aee302d7d31b1b7b47102053388af

    • SHA1

      42ffdc6af95c0b39da1a9bae18a1638a8e66c5d9

    • SHA256

      e7e506b6a558690e6ddb69c5c4c8d4d2728cc909217ba7794d71f957c50d1916

    • SHA512

      534cc58ebaea738347dabbb212ec25f4af9bb9acd0d68481b821bdf03ddf223ff1ee1ca745f0f5b52674b57d9d2d8ab386f384af7cf2b177ab054ebe03f93bbf

    • SSDEEP

      49152:wm7AiX20LOQ4RbZYY+ywWKEtvyFmnP7e4z2QKe4F0:wmalCYxFKuygy4qe

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks