General

  • Target

    JaffaCakes118_31a625ada8a8f025143406ed57424d876567759c3d50bc2dbfb6f90f6bbdd885

  • Size

    191KB

  • Sample

    241223-tepqbatqcr

  • MD5

    429ae067424c426c295c6fe48752f9ec

  • SHA1

    2caebc96d65c9254e6ea5ddcfb36c0f6ba2537cf

  • SHA256

    31a625ada8a8f025143406ed57424d876567759c3d50bc2dbfb6f90f6bbdd885

  • SHA512

    f2e2cab90a735c685c6513c671085cb8f20fc397e84a37e6b58ef4a4305c8790cc90221d0a3f7ec6683694141baa5ab9625ca1ac475867b1f491998fe639e94f

  • SSDEEP

    3072:gbHQ7EmwTYz92tOSJhVgegDwPKmXBu+w5F273kdvsW3/l5UOb7Uo0NDgUefnXx:g4rwMzabgDDMKiBtsFGUJsI//HHUfDEJ

Malware Config

Extracted

Family

amadey

Version

3.47

Botnet

87314e

C2

http://176.113.115.201

Attributes
  • install_dir

    b667dbdcd8

  • install_file

    rovwer.exe

  • strings_key

    21188e16c91719cc2e7e1129fe4e3ad0

  • url_paths

    /3g4mn5s/index.php

rc4.plain

Targets

    • Target

      cf95dca92b0825e77760fdce4714de6aa1f53a157c5b7a8fe55051f5cb44b969

    • Size

      293KB

    • MD5

      fe096068c43e0291845e999f75f400c2

    • SHA1

      dc288ee2967ec97f6c5e0e7fb8293b3ec0aa77ea

    • SHA256

      cf95dca92b0825e77760fdce4714de6aa1f53a157c5b7a8fe55051f5cb44b969

    • SHA512

      ae9c92883625d81df83c825473adead5cf9f6a802827e4f0578ba90eeea50f7f45419dd7d6563a5d78089a9580f93f5d25273b163f1fa681a63556bb1b884c4e

    • SSDEEP

      6144:uvBqgSL8ckht0pMKiBtsFGUJsI/2QbxIwJ6c2:wBEIcg0iBQDsNQ1B0b

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks