General

  • Target

    cd66f377855e2a4f72c3851d5fbf2ae0a4889a0d6397bc2452e33973ca9d8f12

  • Size

    3.1MB

  • Sample

    250102-lzmsfszjhp

  • MD5

    15c7b3c51bc01add70e8882aedbd1d55

  • SHA1

    acb605d4fb05e08b9ce03b34f7dcf6df3139fba5

  • SHA256

    cd66f377855e2a4f72c3851d5fbf2ae0a4889a0d6397bc2452e33973ca9d8f12

  • SHA512

    916438de5037eb75873fe2abe706376abf9a17d71093ba537794c5ef93a60e552e37c8653197dd65e30fce9eada4b85e6f3b0ad893082c1563e6471c313e22b8

  • SSDEEP

    49152:a2P+L9Q+nvglMYlp+gvM0fJJ9r40LJwXNuFOAvk:I9dnva3lp+gvM0fJJpN9wc

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Targets

    • Target

      cd66f377855e2a4f72c3851d5fbf2ae0a4889a0d6397bc2452e33973ca9d8f12

    • Size

      3.1MB

    • MD5

      15c7b3c51bc01add70e8882aedbd1d55

    • SHA1

      acb605d4fb05e08b9ce03b34f7dcf6df3139fba5

    • SHA256

      cd66f377855e2a4f72c3851d5fbf2ae0a4889a0d6397bc2452e33973ca9d8f12

    • SHA512

      916438de5037eb75873fe2abe706376abf9a17d71093ba537794c5ef93a60e552e37c8653197dd65e30fce9eada4b85e6f3b0ad893082c1563e6471c313e22b8

    • SSDEEP

      49152:a2P+L9Q+nvglMYlp+gvM0fJJ9r40LJwXNuFOAvk:I9dnva3lp+gvM0fJJpN9wc

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks