• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
January 6, 2023
Rewterz Threat Alert – LockBit Ransomware – Active IOCs
January 7, 2023

Rewterz Threat Alert – Amadey Botnet – Active IOCs

January 7, 2023

Severity

Medium

Analysis Summary

Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim’s system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, one subject line is “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.

Impact

  • Information Theft
  • Exposure of Sensitive Data

Indicators of Compromise

MD5

  • ab1584a0064fc4a6132e8ae530bf2a27
  • 11a7e34ac7eab95249626be889097378
  • 88d01b2f752a46708b106c66946917a8
  • eea2a8fb45dd969242c2bcfb9f612e48
  • 26fe4336a7d372adf5f211d7f412aecf
  • c381deebc66153d21111d53654b38270

SHA-256

  • 9a303e830a991a9c14a70ecad4b52575b3ed0402d88aa2ff65acc5b776aeaeb7
  • 1ff70af69b2a9166b44d4d34c9ace6cc642e1bd4e0e859cb8d801c685bc21318
  • 4149008af3bfe13e1a659b35c3d320c1b44ba0e9d1e78604781c86be56a190cc
  • 9105be62c82726642cca6359284a860739043ba2a80bb363a53cfda8172e9c7f
  • 250a688bba3b23f2e3d7715c6b0999ebe93ac5418d19f5576522a2bfa27b65cf
  • 6fb4667290e8cf88e1e749120d054be161eb5ed1eaf2d1e2eb51c6121bcbce5d

SHA-1

  • bcee66986d10f96543ccd86f7263b5f57d675d5e
  • 7c1799df6324d3f7c086dbd0810e176d7aa24644
  • 108306ea32939fb9cc950e28e941bfb65ff5c4c3
  • 9059fda6374dd9cea212ef65fb510003a9d4f9da
  • 4fc85afe503f085ef16f57fac073596f8eb10afd
  • 642f0cc887c5e3277878ee374fdf985b8c5d0687

Remediation

  • Block the threat indicators at their respective controls.
  • Search for IOCs in your environment.
  • Do not download such files from the internet without confirming their legitimacy.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.