General

  • Target

    f8976e7568c5a44b6f11eace4422ec004f364dced60b2dbd1595ea2833aee1cd

  • Size

    3.1MB

  • Sample

    241227-gkpw2ssnbq

  • MD5

    75a81cd53dc4f5b69d543b5927443c91

  • SHA1

    a5e696563171aa1ce97675ed24bb7e19ac2da082

  • SHA256

    f8976e7568c5a44b6f11eace4422ec004f364dced60b2dbd1595ea2833aee1cd

  • SHA512

    257b75e796c01de2afc8a621e16ff7319f36a6f73d182534b69dd99a75c099578e955f64dce0d0ad1254d2234a90e497b5fa0866b8e7fdfc38facb0995210820

  • SSDEEP

    49152:QRkVLx2Y+vBQI5SSv59KmMLSWZwriU59e4byTx1UbF3bVnefL6v:QiyY+pR5SSvPKmMLSWZwrXIxebD

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Targets

    • Target

      f8976e7568c5a44b6f11eace4422ec004f364dced60b2dbd1595ea2833aee1cd

    • Size

      3.1MB

    • MD5

      75a81cd53dc4f5b69d543b5927443c91

    • SHA1

      a5e696563171aa1ce97675ed24bb7e19ac2da082

    • SHA256

      f8976e7568c5a44b6f11eace4422ec004f364dced60b2dbd1595ea2833aee1cd

    • SHA512

      257b75e796c01de2afc8a621e16ff7319f36a6f73d182534b69dd99a75c099578e955f64dce0d0ad1254d2234a90e497b5fa0866b8e7fdfc38facb0995210820

    • SSDEEP

      49152:QRkVLx2Y+vBQI5SSv59KmMLSWZwriU59e4byTx1UbF3bVnefL6v:QiyY+pR5SSvPKmMLSWZwrXIxebD

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks