General

  • Target

    bc946f88dbdf73882b2b857c3f2bb4c21c39340dfc390ddd31d963b6a0bfe000

  • Size

    164KB

  • Sample

    241109-3bd9vaxkgm

  • MD5

    f21e467238701f08bb02785b9464fce1

  • SHA1

    1f1a808307daa00f34aa6c2e8cc64717f2355012

  • SHA256

    bc946f88dbdf73882b2b857c3f2bb4c21c39340dfc390ddd31d963b6a0bfe000

  • SHA512

    91f7663b76b9dc61d8f53ae64079acb521c8f9e52ca6cd63627acd2d92d003d77a245bc1c028828ca400e563237e3e3a5b6c6b606b51bfea2dc0e7a973affb48

  • SSDEEP

    3072:nyOHYfUV5AWe3E6MMi75lbDuWaZx/Qc+FxmWuMp76qog+RAbk2iKQAKi:yOHcm583E6c77DubZdQc+Fxm5MlNoTGt

Malware Config

Extracted

Family

amadey

Version

3.50

Botnet

0237fa

C2

http://193.56.146.194

Attributes
  • install_dir

    50c1695437

  • install_file

    rovwer.exe

  • strings_key

    b6d412dd2efdf33d84e939e52040748f

  • url_paths

    /h49vlBP/index.php

rc4.plain

Targets

    • Target

      75db6a858e026323928c3da4d067bbb7a8056f7c21d3f5b20f34e5e46d26d954

    • Size

      207KB

    • MD5

      386d654392d2b43963377d022d51b7db

    • SHA1

      75d1ede968f8ec61f450100b87b6bee850086f17

    • SHA256

      75db6a858e026323928c3da4d067bbb7a8056f7c21d3f5b20f34e5e46d26d954

    • SHA512

      b24f565d3336ac3f7e07c50c8e8313deda29db3f13b55a1d58eb1cfdb3be1b967db88a309fc3a686cc1af31b87efc98b7c09c7d5e161d069fdc1759910024286

    • SSDEEP

      6144:BTQg/IIe3E6E77DubZdcc+Fxm5MlN+zv4Dika72:NQW5t2dccOxmJv4u4

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks