enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
Amadey has used HTTP for C2 communications. |
enterprise |
T1547 |
Boot or Logon Autostart Execution |
- |
enterprise |
T1547.001 |
Registry Run Keys / Startup Folder |
Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys. |
enterprise |
T1005 |
Data from Local System |
Amadey can collect information from a compromised host. |
enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
Amadey has decoded antivirus name strings. |
enterprise |
T1568 |
Dynamic Resolution |
- |
enterprise |
T1568.001 |
Fast Flux DNS |
Amadey has used fast flux DNS for its C2. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
Amadey has sent victim data to its C2 servers. |
enterprise |
T1083 |
File and Directory Discovery |
Amadey has searched for folders associated with antivirus software. |
enterprise |
T1105 |
Ingress Tool Transfer |
Amadey can download and execute files to further infect a host machine with additional malware. |
enterprise |
T1112 |
Modify Registry |
Amadey has overwritten registry keys for persistence. |
enterprise |
T1106 |
Native API |
Amadey has used a variety of Windows API calls, including GetComputerNameA , GetUserNameA , and CreateProcessA . |
enterprise |
T1027 |
Obfuscated Files or Information |
Amadey has obfuscated strings such as antivirus vendor names, domains, files, and others. |
enterprise |
T1518 |
Software Discovery |
- |
enterprise |
T1518.001 |
Security Software Discovery |
Amadey has checked for a variety of antivirus products. |
enterprise |
T1553 |
Subvert Trust Controls |
- |
enterprise |
T1553.005 |
Mark-of-the-Web Bypass |
Amadey has modified the :Zone.Identifier in the ADS area to zero. |
enterprise |
T1082 |
System Information Discovery |
Amadey has collected the computer name and OS version from a compromised machine. |
enterprise |
T1614 |
System Location Discovery |
Amadey does not run any tasks or install additional malware if the victim machine is based in Russia. |
enterprise |
T1016 |
System Network Configuration Discovery |
Amadey can identify the IP address of a victim machine. |
enterprise |
T1033 |
System Owner/User Discovery |
Amadey has collected the user name from a compromised host using GetUserNameA . |