General

  • Target

    821673b648a44cb9d565a0d207102f1012d9123abf5b48388c461e369188fd65

  • Size

    1.8MB

  • Sample

    241120-a6sfqsxcrq

  • MD5

    b94fa28743249de38b5bd60748d6cdc2

  • SHA1

    d6f97d85fa9f8cb50ec6e4409e3e5d4a670cd6f9

  • SHA256

    821673b648a44cb9d565a0d207102f1012d9123abf5b48388c461e369188fd65

  • SHA512

    d02d7560c74259da98f05716461a8af5f84faffa2046b1c23aa59eba76a87ab30fe0f0510ae3965fa02cf99a9b8948ebec11c07a3e838456a673a04642c8d09a

  • SSDEEP

    49152:e+mvxOEOhyu1HYFC4brAfT6zcYFBAzDb7vYkUG:ApOEO7GAezcYFBWDb7L

Malware Config

Extracted

Family

amadey

Version

5.04

Botnet

4bee07

C2

http://185.215.113.209

Attributes
  • install_dir

    fc9e0aaab7

  • install_file

    defnur.exe

  • strings_key

    191655f008adc880f91bfc85bc56db54

  • url_paths

    /Fru7Nk9/index.php

rc4.plain

Targets

    • Target

      821673b648a44cb9d565a0d207102f1012d9123abf5b48388c461e369188fd65

    • Size

      1.8MB

    • MD5

      b94fa28743249de38b5bd60748d6cdc2

    • SHA1

      d6f97d85fa9f8cb50ec6e4409e3e5d4a670cd6f9

    • SHA256

      821673b648a44cb9d565a0d207102f1012d9123abf5b48388c461e369188fd65

    • SHA512

      d02d7560c74259da98f05716461a8af5f84faffa2046b1c23aa59eba76a87ab30fe0f0510ae3965fa02cf99a9b8948ebec11c07a3e838456a673a04642c8d09a

    • SSDEEP

      49152:e+mvxOEOhyu1HYFC4brAfT6zcYFBAzDb7vYkUG:ApOEO7GAezcYFBWDb7L

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks