General

  • Target

    e4ebfe05d5685af733adb8a33f0f13e93798d01bf86d834b89fea6c1f4819211.exe

  • Size

    1.9MB

  • Sample

    250212-mhpq6axnez

  • MD5

    d1c4ee6a5e25dfdc0d2d2c9299af123e

  • SHA1

    1415ecd3d0190709a53b76428b72e195e1633bd3

  • SHA256

    e4ebfe05d5685af733adb8a33f0f13e93798d01bf86d834b89fea6c1f4819211

  • SHA512

    ea0b9f5a9275f15e68a6f5f92fd92b1939f948b486da00d41f391937319d622f423053591f311ff4145da9d26cfef3eaaf790e82b3f2b46b7004853bfa8be24a

  • SSDEEP

    24576:J7PYlhBjkG7uzwoZ5+J1R7+u0gBdHT3LHulBbZi37tqHrqDz/poNgNeggahXGG1N:UoARq+BRurcRqLqfhAgNegg8+zDxZCh

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain
1
a091ec0a6e22276a96a99c1d34ef679c

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain
1
006700e5a2ab05704bbb0c589b88924d

Extracted

Family

cryptbot

Targets

    • Target

      e4ebfe05d5685af733adb8a33f0f13e93798d01bf86d834b89fea6c1f4819211.exe

    • Size

      1.9MB

    • MD5

      d1c4ee6a5e25dfdc0d2d2c9299af123e

    • SHA1

      1415ecd3d0190709a53b76428b72e195e1633bd3

    • SHA256

      e4ebfe05d5685af733adb8a33f0f13e93798d01bf86d834b89fea6c1f4819211

    • SHA512

      ea0b9f5a9275f15e68a6f5f92fd92b1939f948b486da00d41f391937319d622f423053591f311ff4145da9d26cfef3eaaf790e82b3f2b46b7004853bfa8be24a

    • SSDEEP

      24576:J7PYlhBjkG7uzwoZ5+J1R7+u0gBdHT3LHulBbZi37tqHrqDz/poNgNeggahXGG1N:UoARq+BRurcRqLqfhAgNegg8+zDxZCh

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.