General

  • Target

    1d09c4fd03e43345181a451a8cd332985d796244a924cf4d2e132d91f3f4c0a0.exe

  • Size

    523KB

  • Sample

    241124-vqp1wswmhp

  • MD5

    84990bd83bb14b6220562dafd9b2cc21

  • SHA1

    85095ee70c3e47bc548f3d57b4ebeb88b08434a1

  • SHA256

    1d09c4fd03e43345181a451a8cd332985d796244a924cf4d2e132d91f3f4c0a0

  • SHA512

    641efd4859f464c96ed788f98bb99d577136e8e49e17e6c6c40e2828fa8f5191ff94850411197450c5c21448b7e14c7ea9317d7906a1240f4bf21ef7b8122bb7

  • SSDEEP

    12288:ZMrHy904UVvH8QgMIaDXnIOZiv6DcYq9vW1v94+rk:iyUVEs9D31ZigcYT14Qk

Malware Config

Extracted

Family

amadey

Version

3.66

Botnet

47d0a3

C2

http://62.204.41.5

Attributes
  • install_dir

    5eb6b96734

  • install_file

    mnolyk.exe

  • strings_key

    4e2443c99695fdd2c1517b867af1bc22

  • url_paths

    /Bu58Ngs/index.php

rc4.plain

Targets

    • Target

      1d09c4fd03e43345181a451a8cd332985d796244a924cf4d2e132d91f3f4c0a0.exe

    • Size

      523KB

    • MD5

      84990bd83bb14b6220562dafd9b2cc21

    • SHA1

      85095ee70c3e47bc548f3d57b4ebeb88b08434a1

    • SHA256

      1d09c4fd03e43345181a451a8cd332985d796244a924cf4d2e132d91f3f4c0a0

    • SHA512

      641efd4859f464c96ed788f98bb99d577136e8e49e17e6c6c40e2828fa8f5191ff94850411197450c5c21448b7e14c7ea9317d7906a1240f4bf21ef7b8122bb7

    • SSDEEP

      12288:ZMrHy904UVvH8QgMIaDXnIOZiv6DcYq9vW1v94+rk:iyUVEs9D31ZigcYT14Qk

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks