General

  • Target

    9db2372193e9dd7736163fe1848d3912d985db145083d67bff2eae88d1206237.exe

  • Size

    1.8MB

  • Sample

    241228-dahhfavkas

  • MD5

    f5821e480d16f40d9eca6432956ae44e

  • SHA1

    6b56e36b29bb7dfa195850c0bb28dbbd65a84714

  • SHA256

    9db2372193e9dd7736163fe1848d3912d985db145083d67bff2eae88d1206237

  • SHA512

    4a42a28c9bc6a7c20e862a17ad590afe3863c5e757c3ba38545a395b291bf9aa555175978d1e0b87823f2fbfc51c18c73b0749e63fcab6c32003d8bd6343c137

  • SSDEEP

    24576:/eJimJdfcVrd13YLNIYOmumHZCsDy0VzPTA0K2pYwdSVjtHj4jJ1wHj5NKeyk:/MZJdf0r/3YWDmTs8hzbIJWj8Xy

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Targets

    • Target

      9db2372193e9dd7736163fe1848d3912d985db145083d67bff2eae88d1206237.exe

    • Size

      1.8MB

    • MD5

      f5821e480d16f40d9eca6432956ae44e

    • SHA1

      6b56e36b29bb7dfa195850c0bb28dbbd65a84714

    • SHA256

      9db2372193e9dd7736163fe1848d3912d985db145083d67bff2eae88d1206237

    • SHA512

      4a42a28c9bc6a7c20e862a17ad590afe3863c5e757c3ba38545a395b291bf9aa555175978d1e0b87823f2fbfc51c18c73b0749e63fcab6c32003d8bd6343c137

    • SSDEEP

      24576:/eJimJdfcVrd13YLNIYOmumHZCsDy0VzPTA0K2pYwdSVjtHj4jJ1wHj5NKeyk:/MZJdf0r/3YWDmTs8hzbIJWj8Xy

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks