General

  • Target

    862754bf3bc305550d60a5391ee26dc8f49ec3ddee9d6bae2e43fb66118f812d

  • Size

    1.8MB

  • Sample

    241226-1ctd2s1mhl

  • MD5

    26e58db02ced3bbe7e14f75f9cb5b083

  • SHA1

    5e9f0475344e5ff180d44d956823150f902e4bbc

  • SHA256

    862754bf3bc305550d60a5391ee26dc8f49ec3ddee9d6bae2e43fb66118f812d

  • SHA512

    963c1978655ee118541a088aa5e6f171e0c6a78294c27a8cdd006c311d9f7917361bc945fb6a16c43425a4297fa5fd01c4b5c7adda16e3aeedc253981df814bd

  • SSDEEP

    49152:vjCaS67V3aQ2hJaa25qdtECXsqzMii5W:LCaS672JaCIqvp

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Targets

    • Target

      862754bf3bc305550d60a5391ee26dc8f49ec3ddee9d6bae2e43fb66118f812d

    • Size

      1.8MB

    • MD5

      26e58db02ced3bbe7e14f75f9cb5b083

    • SHA1

      5e9f0475344e5ff180d44d956823150f902e4bbc

    • SHA256

      862754bf3bc305550d60a5391ee26dc8f49ec3ddee9d6bae2e43fb66118f812d

    • SHA512

      963c1978655ee118541a088aa5e6f171e0c6a78294c27a8cdd006c311d9f7917361bc945fb6a16c43425a4297fa5fd01c4b5c7adda16e3aeedc253981df814bd

    • SSDEEP

      49152:vjCaS67V3aQ2hJaa25qdtECXsqzMii5W:LCaS672JaCIqvp

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks