阿馬迪
Amadey 黑客工具是由不知名的惡意威脅參與者開發的殭屍網絡生成器,並在各種黑客論壇上出售。它首次出現於 2019 年初。這種威脅也可以用作第一階段的有效載荷,可以向主機引入額外的惡意軟件。最初,Amadey 黑客工具的價格約為 500 美元。這種威脅獲得了一些關注並且似乎賣得很好,因為惡意軟件研究人員發現 Amadey 工具被用於全球許多不同的活動。甚至臭名昭著的 TA505 黑客組織也得到了 Amadey 威脅。
目錄
分銷策略
Amadey 是一種主要針對基於 Windows 的系統的惡意軟件。它通常通過各種方式進入目標系統,包括:
- 電子郵件附件:Amadey 可能通過包含惡意附件的垃圾郵件進行分發,例如受感染的 Microsoft Office 文檔(例如,Word 或 Excel 文件)、PDF 文件或 ZIP 存檔。一旦收件人打開附件,就可以執行惡意軟件。
- 惡意網站:Amadey 可以通過受感染的網站或惡意網站進行傳播。如果您訪問受感染的網站或單擊觸發路過式下載的惡意鏈接,可能會發生這種情況,從而導致惡意程序在您不知情的情況下安裝到您的系統中。
- 漏洞利用工具包:漏洞利用工具包是網絡犯罪分子用來利用軟件漏洞的工具包。 Amadey 可能是這樣分佈的,它利用未修補的軟件漏洞將惡意軟件傳送到目標系統。
安靜運作
Amadey 操作員可以通過他們的 Web 瀏覽器獲得管理權限和遠程訪問,以控制受感染的系統。然而,所有這一切都是在受害者用戶看不見的情況下悄悄進行的。受害者很可能甚至沒有意識到惡意軟件感染已經劫持了他們的系統,並且它現在已成為殭屍網絡的一部分。
堅持
一旦 Amadey 殭屍網絡構建器滲透到系統中,它就可以檢查是否存在任何最常見的反惡意軟件工具。 Amadey 黑客工具能夠通過修改 Windows 註冊表來獲得持久性,從而確保每次系統重啟時都會啟動威脅。
能力
這個黑客工具的功能列表有些有限。 Amadey 殭屍網絡構建器可以收集有關受感染主機的信息,包括:
- 操作系統。
- 用戶名。
- 網絡配置。
- 硬件。
除了能夠劫持計算機並將其添加到殭屍網絡,這可能會被用於執行 DDoS(分佈式拒絕服務)攻擊之外,這種威脅還可以用作第一階段的有效載荷,這將作為後門,攻擊者可以用額外的和潛在更具威脅性的惡意軟件感染主機。
在這個時代,我們誰都不能忽視網絡安全。確保下載並安裝合法的防病毒軟件套件,以確保系統安全。
如何避免 Amadey Bot
為幫助避免 Amadey 惡意軟件和類似威脅,請考慮實施以下預防措施:
- 保持軟件更新:定期更新您的操作系統、網絡瀏覽器和其他軟件應用程序。
- 謹慎處理電子郵件附件:如果您收到意外附件,請在打開之前通過不同的通信渠道與發件人核實其真實性。
- 警惕網絡釣魚嘗試:避免點擊電子郵件或消息中看似可疑或來源不可靠的鏈接。
- 使用可靠的安全軟件:在您的系統上安裝信譽良好的防病毒產品和反惡意軟件,並保持更新。
- 定期數據備份:在單獨的存儲設備或云中維護重要文件和數據的定期備份。如果發生惡意軟件感染或其他事件,擁有最近的備份可確保您可以恢復數據並將潛在損害降至最低。
- 養成安全的瀏覽習慣:避免訪問可疑或不受信任的網站。單擊廣告或鏈接時要小心,因為它們可能會將您重定向到分發惡意軟件的惡意網站。
分析报告
一般信息
| Family Name: | Trojan.Amadey |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
4f7dd64dab6c5a47dc113589ed95f131
SHA1:
f107ea76c84db39fbdc10dce73ac2925529a41a4
SHA256:
B66C02C0AE954074DC4E4C9FCA01BA45A0C35B75919535F27FEF6FB59617C15B
文件大小:
849.41 KB, 849408 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have security information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| 姓名 | 价值 |
|---|---|
| Company Name | Microsoft Corporation |
| File Description | Win32 Cabinet Self-Extractor |
| File Version | 11.00.17763.1 (WinBuild.160101.0800) |
| Internal Name | Wextract |
| Legal Copyright | © Microsoft Corporation. All rights reserved. |
| Original Filename | WEXTRACT.EXE .MUI |
| Product Name | Internet Explorer |
| Product Version | 11.00.17763.1 |
File Traits
- No Version Info
- WriteProcessMemory
- x86
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\f2696808.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\f2696808.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp000.tmp\v2696511.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp000.tmp\v2696511.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp001.tmp\e5630715.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp001.tmp\e5630715.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp001.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp001.tmp\v3696399.exe | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\ixp001.tmp\v3696399.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\d8715226.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\d8715226.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp002.tmp\v9882882.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp002.tmp\v9882882.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\c3559334.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\c3559334.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
| c:\users\user\appdata\local\temp\ixp003.tmp\v2891154.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp003.tmp\v2891154.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\a1084955.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\a1084955.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\a1084955.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\b5900476.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\b5900476.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\b5900476.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ixp004.tmp\tmp4351$.tmp | Generic Write,Read Attributes,Delete |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | 数据 | API Name |
|---|---|---|
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup0 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP000.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup1 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP001.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup2 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP002.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup3 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP003.TMP\" | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::wextract_cleanup4 | rundll32.exe C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Cdspunrm\AppData\Local\Temp\IXP004.TMP\" | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Syscall Use |
Show More
|
| User Data Access |
|
| Service Control |
|
| Other Suspicious |
|
| Anti Debug |
|
| Encryption Used |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\Users\Cdspunrm\AppData\Local\Temp\IXP000.TMP\v2696511.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP001.TMP\v3696399.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP002.TMP\v9882882.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP003.TMP\v2891154.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP004.TMP\a1084955.exe
|
Show More
C:\Users\Cdspunrm\AppData\Local\Temp\IXP004.TMP\b5900476.exe
|
C:\Users\Cdspunrm\AppData\Local\Temp\IXP003.TMP\c3559334.exe
|