General

  • Target

    603938f595af3a87bfa9aa8bb32786e7e281dd49dd9562766febe381867972f1

  • Size

    2.9MB

  • Sample

    241226-fc1g5sxjgx

  • MD5

    38ec94364985dc8659d0ca14d1055285

  • SHA1

    98107fc8ab309129a20731c5a5afa5f70cfba049

  • SHA256

    603938f595af3a87bfa9aa8bb32786e7e281dd49dd9562766febe381867972f1

  • SHA512

    84dd3688dc9b10d0eb10d086b7afb4d259328a2e7e27c034a5f496f49f238838aee0091e8b3cc89eb3b6be61a5e4db6018387cb9ff09d68315da6b04d4f35e25

  • SSDEEP

    49152:QpYiywBKlEQwGeVnIR+wrJWtZ7SL4W0cE6M:ZiywBAEfGeVIRHJWCL4W0cdM

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Targets

    • Target

      603938f595af3a87bfa9aa8bb32786e7e281dd49dd9562766febe381867972f1

    • Size

      2.9MB

    • MD5

      38ec94364985dc8659d0ca14d1055285

    • SHA1

      98107fc8ab309129a20731c5a5afa5f70cfba049

    • SHA256

      603938f595af3a87bfa9aa8bb32786e7e281dd49dd9562766febe381867972f1

    • SHA512

      84dd3688dc9b10d0eb10d086b7afb4d259328a2e7e27c034a5f496f49f238838aee0091e8b3cc89eb3b6be61a5e4db6018387cb9ff09d68315da6b04d4f35e25

    • SSDEEP

      49152:QpYiywBKlEQwGeVnIR+wrJWtZ7SL4W0cE6M:ZiywBAEfGeVIRHJWCL4W0cdM

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks