阿马迪
Amadey 黑客工具是由不知名的恶意威胁参与者开发的僵尸网络生成器,并在各种黑客论坛上出售。它首次出现于 2019 年初。这种威胁也可以用作第一阶段的有效载荷,可以向主机引入额外的恶意软件。最初,Amadey 黑客工具的价格约为 500 美元。这种威胁获得了一些关注并且似乎卖得很好,因为恶意软件研究人员发现 Amadey 工具被用于全球许多不同的活动。甚至臭名昭著的 TA505 黑客组织也得到了 Amadey 威胁。
目录
分销策略
Amadey 是一种主要针对基于 Windows 的系统的恶意软件。它通常通过各种方式进入目标系统,包括:
- 电子邮件附件:Amadey 可能通过包含恶意附件的垃圾邮件进行分发,例如受感染的 Microsoft Office 文档(例如,Word 或 Excel 文件)、PDF 文件或 ZIP 存档。一旦收件人打开附件,就可以执行恶意软件。
- 恶意网站:Amadey 可以通过受感染的网站或恶意网站进行传播。如果您访问受感染的网站或单击触发路过式下载的恶意链接,可能会发生这种情况,从而导致恶意程序在您不知情的情况下安装到您的系统中。
- 漏洞利用工具包:漏洞利用工具包是网络犯罪分子用来利用软件漏洞的工具包。 Amadey 可能是这样分布的,它利用未修补的软件漏洞将恶意软件传送到目标系统。
安静运作
Amadey 操作员可以通过他们的 Web 浏览器获得管理权限和远程访问,以控制受感染的系统。然而,所有这一切都是在受害者用户看不见的情况下悄悄进行的。受害者很可能甚至没有意识到恶意软件感染已经劫持了他们的系统,并且它现在已成为僵尸网络的一部分。
坚持
一旦 Amadey 僵尸网络构建器渗透到系统中,它就可以检查是否存在任何最常见的反恶意软件工具。 Amadey 黑客工具能够通过修改 Windows 注册表来获得持久性,从而确保每次系统重启时都会启动威胁。
能力
这个黑客工具的功能列表有些有限。 Amadey 僵尸网络构建器可以收集有关受感染主机的信息,包括:
- 操作系统。
- 用户名。
- 网络配置。
- 硬件。
除了能够劫持计算机并将其添加到僵尸网络,这可能会被用于执行 DDoS(分布式拒绝服务)攻击之外,这种威胁还可以用作第一阶段的有效载荷,这将作为后门,攻击者可以用额外的和潜在更具威胁性的恶意软件感染主机。
在这个时代,我们谁都不能忽视网络安全。确保下载并安装合法的防病毒软件套件,以确保系统安全。
如何避免 Amadey Bot
为帮助避免 Amadey 恶意软件和类似威胁,请考虑实施以下预防措施:
- 保持软件更新:定期更新您的操作系统、网络浏览器和其他软件应用程序。
- 谨慎处理电子邮件附件:如果您收到意外附件,请在打开之前通过不同的通信渠道与发件人核实其真实性。
- 警惕网络钓鱼尝试:避免点击电子邮件或消息中看似可疑或来源不可靠的链接。
- 使用可靠的安全软件:在您的系统上安装信誉良好的防病毒产品和反恶意软件,并保持更新。
- 定期数据备份:在单独的存储设备或云中维护重要文件和数据的定期备份。如果发生恶意软件感染或其他事件,拥有最近的备份可确保您可以恢复数据并将潜在损害降至最低。
- 养成安全的浏览习惯:避免访问可疑或不受信任的网站。单击广告或链接时要小心,因为它们可能会将您重定向到分发恶意软件的恶意网站。
分析报告
一般信息
| Family Name: | Trojan.Amadey |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
4f7dd64dab6c5a47dc113589ed95f131
SHA1:
f107ea76c84db39fbdc10dce73ac2925529a41a4
SHA256:
B66C02C0AE954074DC4E4C9FCA01BA45A0C35B75919535F27FEF6FB59617C15B
文件大小:
849.41 KB, 849408 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have security information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| 姓名 | 价值 |
|---|---|
| Company Name | Microsoft Corporation |
| File Description | Win32 Cabinet Self-Extractor |
| File Version | 11.00.17763.1 (WinBuild.160101.0800) |
| Internal Name | Wextract |
| Legal Copyright | © Microsoft Corporation. All rights reserved. |
| Original Filename | WEXTRACT.EXE .MUI |
| Product Name | Internet Explorer |
| Product Version | 11.00.17763.1 |
File Traits
- No Version Info
- WriteProcessMemory
- x86
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\f2696808.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\f2696808.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp000.tmp\v2696511.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\v2696511.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp001.tmp\e5630715.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp001.tmp\e5630715.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp001.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp001.tmp\v3696399.exe | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\ixp001.tmp\v3696399.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\d8715226.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\d8715226.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp002.tmp\v9882882.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\v9882882.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\c3559334.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\c3559334.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp003.tmp\v2891154.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\v2891154.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\a1084955.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\a1084955.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\a1084955.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\b5900476.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\b5900476.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\b5900476.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | 数据 | API Name |
|---|---|---|
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup1 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP001.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup2 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP002.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup3 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP003.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup4 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP004.TMP\" | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Syscall Use |
Show More
|
| User Data Access |
|
| Service Control |
|
| Other Suspicious |
|
| Anti Debug |
|
| Encryption Used |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\Users\Cdspunrm\AppData\Local\Temp\IXP000.TMP\v2696511.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP001.TMP\v3696399.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP002.TMP\v9882882.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP003.TMP\v2891154.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP004.TMP\a1084955.exe
|
Show More
C:\Users\Cdspunrm\AppData\Local\Temp\IXP004.TMP\b5900476.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP003.TMP\c3559334.exe
|