General

  • Target

    ama.exe

  • Size

    1.8MB

  • Sample

    241218-mn5pkawqdq

  • MD5

    077b16532e2f2bc14848b1b90faaa4db

  • SHA1

    4f98a243cb26ad1b2c5c2671ebf16b1c4631837d

  • SHA256

    8e9ed73e06887f551baaccf5705e6dd5aea7a2e186d92afb0c9655f106408939

  • SHA512

    acb531b322efa44390a09a1ff62947ebf009efc9cd591e971deff05d8ef6c8b0afb0b58fe86359e92cd6383481f8a01fea29e2c56b08e7c2b33cf64a4f0705de

  • SSDEEP

    24576:mZEGcEiC2zTbdnwak8LjxWbkqg7o0nFpQYT4AvKxDoBJuZV3jjjvjq6WCPzReF3q:mV2zThX10kvcevRJyx4uv3jjju6reLp

Malware Config

Extracted

Family

amadey

Version

5.04

Botnet

4bee07

C2

http://185.215.113.209

Attributes
  • install_dir

    fc9e0aaab7

  • install_file

    defnur.exe

  • strings_key

    191655f008adc880f91bfc85bc56db54

  • url_paths

    /Fru7Nk9/index.php

rc4.plain

Targets

    • Target

      ama.exe

    • Size

      1.8MB

    • MD5

      077b16532e2f2bc14848b1b90faaa4db

    • SHA1

      4f98a243cb26ad1b2c5c2671ebf16b1c4631837d

    • SHA256

      8e9ed73e06887f551baaccf5705e6dd5aea7a2e186d92afb0c9655f106408939

    • SHA512

      acb531b322efa44390a09a1ff62947ebf009efc9cd591e971deff05d8ef6c8b0afb0b58fe86359e92cd6383481f8a01fea29e2c56b08e7c2b33cf64a4f0705de

    • SSDEEP

      24576:mZEGcEiC2zTbdnwak8LjxWbkqg7o0nFpQYT4AvKxDoBJuZV3jjjvjq6WCPzReF3q:mV2zThX10kvcevRJyx4uv3jjju6reLp

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks