General

  • Target

    7801dff5ada7dcd0fd4d76b1ce5842fe62c391fe9d29481033a34c0f01a19320

  • Size

    1.8MB

  • Sample

    250125-f3h1saxphs

  • MD5

    9b233594308d1b8495dbd4575d2b5125

  • SHA1

    904c02b3c3ff08d4824a44c2594dfd3c1148dd37

  • SHA256

    7801dff5ada7dcd0fd4d76b1ce5842fe62c391fe9d29481033a34c0f01a19320

  • SHA512

    a3d9fee7124bd282a426925b11ffc54439b54fe5af45467e2f6c1088af757e1244f8cfc6373b0c901de66d6332cf07986fba5873971c45210f064f5de9761cf9

  • SSDEEP

    49152:lAIu71VqbO1OqtpyOafGa3JvS4zdK7EI5s:l9I1gi1OqtwOgGOJq0A7BS

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Targets

    • Target

      7801dff5ada7dcd0fd4d76b1ce5842fe62c391fe9d29481033a34c0f01a19320

    • Size

      1.8MB

    • MD5

      9b233594308d1b8495dbd4575d2b5125

    • SHA1

      904c02b3c3ff08d4824a44c2594dfd3c1148dd37

    • SHA256

      7801dff5ada7dcd0fd4d76b1ce5842fe62c391fe9d29481033a34c0f01a19320

    • SHA512

      a3d9fee7124bd282a426925b11ffc54439b54fe5af45467e2f6c1088af757e1244f8cfc6373b0c901de66d6332cf07986fba5873971c45210f064f5de9761cf9

    • SSDEEP

      49152:lAIu71VqbO1OqtpyOafGa3JvS4zdK7EI5s:l9I1gi1OqtwOgGOJq0A7BS

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks