Rewterz
LokiBot Malware – Active IOCs
April 8, 2025
Rewterz
CVE-2024-57357 – TP-Link TL-WPA 8630 Vulnerability
April 8, 2025

Amadey Botnet – Active IOCs

Severity

Meduim

Analysis Summary

Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.

Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.

Impact

  • Information Theft
  • Exposure of Sensitive Data

Indicators of Compromise

MD5

  • 2a29072e101333ceba9cf14225fb2937

  • 5a0c7d37859d3542f6772b9ef5ee5cf8

  • 0d397828202c894e2ef844b26e254853

  • f258ba9ca646b9749d7f22a3dfdc77d2

SHA-256

  • 72b2c77bc9da721dc2b93ebccd42afeb3f692f36e5cc89c014b957859735c161

  • 16b64046640bb6230c3bf41bdebb18224781fef9f2225bc30b82a063b1ed3fa8

  • d26022e6a7e6e4fc7daba48705a49845fe73acd2630d577937cde2c9948b4614

  • fcc3edcd526b0c746998d72af8ce9cc29b0bd801f767078cc472f93d57eee9ef

SHA-1

  • 364c2652d65b063dfa6e9f67681f6dfa4fd66a8e

  • 27b53f77c9f99b87c6f9b1908310a5e2d73d1a79

  • 643c9fa847acfab19a151de57596d88be6d5fd11

  • 36ee4ef9e49e0ebb8973c8f50849d6367c03e69b

Remediation

  • Block all threat indicators at your respective controls.
  • Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
  • Emails from unknown senders should always be treated with caution.
  • Never trust or open links and attachments received from unknown sources/senders.