

Microsoft Edge Vulnerabilities Allow Remote Code Execution – Update Now
February 7, 2025
Hackers Exploiting IIS Servers to Deploy BadIIS Malware
February 9, 2025
Microsoft Edge Vulnerabilities Allow Remote Code Execution – Update Now
February 7, 2025
Hackers Exploiting IIS Servers to Deploy BadIIS Malware
February 9, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
9fa26299f76f34929b65fced0dbfb848
43e14b016c4a24d8cc0ecd8ddca196a5
7db5c669a674f639e4e086337a9752ac
SHA-256
1a118b53ccfb1c1bcc41a436bd32896ca9d3d40b143d9c4127f69a125734a908
90256ffaecaef72d4ea2147a53d2030dd8bcf3cde5fa5e2dc1f09a58f491b740
048cab5a0b9b8950d2a3412698464a3dc322ea128e50cb7977cefd26eb12dfe7
SHA-1
3a714ec7b436185520e05a4f0e5d6fac1647a913
986e2d3427e5140cd224dd4d7e2f4c608aa6f953
4ead96cc70b32c52bed2983b5b69e6cc3c896ad8
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.