Akira Ransomware – Active IOCs
July 3, 2025Akira Ransomware – Active IOCs
July 3, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
2c30f778490f7a65e50ac9da9e719729
264ef1f2d1acc8ec939ed5295b747467
79875579217d38930dfe270fd7e14df1
SHA-256
fd7f82786f81a4a0cefd6c7327b96553593f340ec184499ba40935ff1cbd6469
dda5a29e3dab9f1725064663fc8d6e3032c72ca5aaf347c29f243d1e9b44ce0a
3633b51985b6b9175755b0caad89fbcfd81aef6914aeb327ce2dedfb1f1c8b27
SHA-1
0df8ab6d11354c55dce9268595ab8b32451379ff
4b7dd09a5ce034a5cde48492d82e14305c819743
64138d4d9e4e6615ae74083e14726bcd90e88ff9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.