

Python RAT Uses Discord Interface to Execute Remote Attacks
April 29, 2025
ICS: Multiple Delta Electronics ISPSoft Vulnerabilities
April 30, 2025
Python RAT Uses Discord Interface to Execute Remote Attacks
April 29, 2025
ICS: Multiple Delta Electronics ISPSoft Vulnerabilities
April 30, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
1a2d0fd61c88e6418f984f78884662e6
65d4468189505bb4d791c4341c645033
cad072625f58988f1773fb23e9e38ff0
0c3f83b455aafd1fa11b4fb436b36393
SHA-256
8aecd82f1657ec863032e6b326d0c91a7599200a0ef9ba4bfe88a9da5256de8c
9024874d28bb97920f3ec5edad7e5e3f1fb9184fb38176abfa167fa7a2cb42f9
e52a6b8ce269e1b7e5b867cff03b89b00f053796386829222777196875655fbd
da207db111111bd0c937fb784c29a81d5306a251adef5d1db094bdf01653835b
SHA-1
4420b56b59d83516c4df8063d17b0c11a093e194
feb0b3768c25a2a2a1e7b50821644503b20db480
cc502785ba12f202dc3e2e4e98e46d3c074e0623
aaeb7d47cb6c7bb28976c0ce565619e453111844
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.