General

  • Target

    0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce

  • Size

    7.1MB

  • Sample

    241126-dcymfaxkfn

  • MD5

    05c7e7195dbaac2ea5a9134ed18f2a24

  • SHA1

    dd21fd691c40d85c73690713902b780a7ac4a454

  • SHA256

    0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce

  • SHA512

    73164a2a866517427ba090232e5ad6bbf24bfad35d97c39ee347e7c9e015ac845fc465a52cdaf6f9cedcfd752cf42fa7ce97c1ab6636b6c692b7ec08b480be71

  • SSDEEP

    196608:eAD2Vl1Y/dcCPR9AE0VLtBw4xh9Wv+Ig7A:eES1Y6wvULzw4r9Lj

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce

    • Size

      7.1MB

    • MD5

      05c7e7195dbaac2ea5a9134ed18f2a24

    • SHA1

      dd21fd691c40d85c73690713902b780a7ac4a454

    • SHA256

      0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce

    • SHA512

      73164a2a866517427ba090232e5ad6bbf24bfad35d97c39ee347e7c9e015ac845fc465a52cdaf6f9cedcfd752cf42fa7ce97c1ab6636b6c692b7ec08b480be71

    • SSDEEP

      196608:eAD2Vl1Y/dcCPR9AE0VLtBw4xh9Wv+Ig7A:eES1Y6wvULzw4r9Lj

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Modifies Windows Defender Real-time Protection settings

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.