General

  • Target

    random.exe

  • Size

    1.8MB

  • Sample

    250326-zapgmsvkt2

  • MD5

    53f24086dc5ae9e8e778e4b6fe6dacac

  • SHA1

    86743fc7837b42371aad3aa62660b5351253c53b

  • SHA256

    53d4b7a917d975149ee9a757ccbb944e5a7f40814b07108358495bef54e1371d

  • SHA512

    42f3b01c4f039995837e2157caf6bada0bb32ecea9ecdc48a92f30b181e741ccd91f1a1de5538f34e3fceb3f13e72b40a6984d513fd421bb1e6dd7561d6ba0cf

  • SSDEEP

    24576:CtGHLU9QqvWZRjmY3N/KQWteLFYxEOw/kMcv8QfMIOXMPKaDafM/Z1aVrQRsAtFQ:CtGg9QbRqK52ehsMc5BLVAvQF

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Targets

    • Target

      random.exe

    • Size

      1.8MB

    • MD5

      53f24086dc5ae9e8e778e4b6fe6dacac

    • SHA1

      86743fc7837b42371aad3aa62660b5351253c53b

    • SHA256

      53d4b7a917d975149ee9a757ccbb944e5a7f40814b07108358495bef54e1371d

    • SHA512

      42f3b01c4f039995837e2157caf6bada0bb32ecea9ecdc48a92f30b181e741ccd91f1a1de5538f34e3fceb3f13e72b40a6984d513fd421bb1e6dd7561d6ba0cf

    • SSDEEP

      24576:CtGHLU9QqvWZRjmY3N/KQWteLFYxEOw/kMcv8QfMIOXMPKaDafM/Z1aVrQRsAtFQ:CtGg9QbRqK52ehsMc5BLVAvQF

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks