General

  • Target

    5b24f29aab708907f8acbe4d16873a0116533029b81f0c1f9a5fad5b3a54a2d9

  • Size

    1.8MB

  • Sample

    250211-zk4pbazlh1

  • MD5

    b1447ca027b813486bbd9bb290cfbd0d

  • SHA1

    e772fac1228583d6d9e7b853ba4b3d6cf606dfa8

  • SHA256

    5b24f29aab708907f8acbe4d16873a0116533029b81f0c1f9a5fad5b3a54a2d9

  • SHA512

    bb91fbd271ac6e3655ad538c41af6c3089787ae23c750ac0106f2a2481835e3b0691056258438d139ee70cbf6169d0ca42948683fe0bf5b03b10c73cbd34bd5f

  • SSDEEP

    49152:JxMsunbmOnBAd1H6ddyXwhHIBVm7FvzvEO1wxM:KneaddcWztzvEOV

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain
1
a091ec0a6e22276a96a99c1d34ef679c

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Targets

    • Target

      5b24f29aab708907f8acbe4d16873a0116533029b81f0c1f9a5fad5b3a54a2d9

    • Size

      1.8MB

    • MD5

      b1447ca027b813486bbd9bb290cfbd0d

    • SHA1

      e772fac1228583d6d9e7b853ba4b3d6cf606dfa8

    • SHA256

      5b24f29aab708907f8acbe4d16873a0116533029b81f0c1f9a5fad5b3a54a2d9

    • SHA512

      bb91fbd271ac6e3655ad538c41af6c3089787ae23c750ac0106f2a2481835e3b0691056258438d139ee70cbf6169d0ca42948683fe0bf5b03b10c73cbd34bd5f

    • SSDEEP

      49152:JxMsunbmOnBAd1H6ddyXwhHIBVm7FvzvEO1wxM:KneaddcWztzvEOV

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.