CISA Warns of Chromium 0-Day Exploited in Attacks
July 27, 2025Microsoft AppLocker Flaw Enables Security Bypass
July 28, 2025CISA Warns of Chromium 0-Day Exploited in Attacks
July 27, 2025Microsoft AppLocker Flaw Enables Security Bypass
July 28, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
d4e7e734cd14dfb7ade4452f83598363
89976147ca899ad743405d183eff8d03
820c905d2eecac47f9be34e66a208358
63aef445d7fb0ab2c560e4a2d864898e
SHA-256
f05b428de5693cf8bf348a8d1ee870a322d1c6900609b63ca22c49143e8e4124
61dedbd735c22f2f0a15e6ecdea9f9be5c9c1263a5d95d451365d38432ff61a2
91c0848f6ce21b90c0452e200d8182da8f4942de5bb014d3359fdab150e6229f
2220c14ec416ff9ec8868b13f0db69545280a1b9fef9ff1c56e744516c74f8aa
SHA-1
5d674032bd5f8e155d63ee7873efedc198a0d5b9
19dc3928826c8350ca8f27f083dabaf0b30a269a
c40fa61d617a9440d9e0f02ebb9a1677c89152f9
ab3e481089494072b98e449893dfa97e89da70f8
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.