General

  • Target

    99a7a8ab2463dd70f90e0ab4e0aec4a8.bin

  • Size

    1.7MB

  • Sample

    241222-byyhfsxqbx

  • MD5

    29ecbda9d8f778b07a8521771cf045a7

  • SHA1

    c18e6847fadcae6736ce2c7a9a99e3e155f2827d

  • SHA256

    ac395b83717805ed5521819d6aa4f6e87556f767bc1a2ec8ceb57d20228fd0d8

  • SHA512

    ff40fa340abce68df8b4050ab2bf9605f05a50110770756016c97d3064ebea70b22e0af4fd69d9710f06aebcc6f76394b971adb04cf7e5bbebb9a7096a94c0e3

  • SSDEEP

    49152:igIeuogf0iQvaJDC2Z3M4up/Xbizp7HT7n7KMROssG04/ii:3FliQvaJD7Z3M4cGzRz7GBsjB/p

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Targets

    • Target

      89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61.exe

    • Size

      2.9MB

    • MD5

      99a7a8ab2463dd70f90e0ab4e0aec4a8

    • SHA1

      b9e2b99b7124d83df3b7cd052231cb35d1d6efcb

    • SHA256

      89601168c7196328f763faf4dd415b041c94f6d5fe5c2b7094d49dba69926a61

    • SHA512

      8e775104cc32b5426fbfe170632ca36949e66701a52b83fd8378b4eca239f928094dfca10ba9ae363c8aaad59f863260427fc5449ea7ca0e22ddda4256326e55

    • SSDEEP

      49152:rXbVHNeIAyjLGBiZQo42rhxAZimUH0wH6faFgmiCk/uIL:rzxXnGBiZQo42rhxAZi0wHymU

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks