Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Amadey
Trojan:Win32/Amadey.AMD!MTB is a concrete detection of Amadey, a sophisticated Win32 trojan and botnet loader. It employs extensive process hooking, leverages system utilities for persistence (scheduled tasks, BITS, regsvr32/rundll32), and is designed to download and execute additional malicious payloads, posing a significant risk for further compromise and data exfiltration.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
rule Trojan_Win32_Amadey_AMD_2147893178_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/Amadey.AMD!MTB"
threat_id = "2147893178"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "Amadey"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "1"
strings_accuracy = "High"
strings:
$x_1_1 = {6a 00 8d 4d e8 51 50 56 ff 75 b4 ff d3 8d 45 ec 50 ff 75 ec 56 57} //weight: 1, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}1475a3bb4ec2d699b19fcc965c7a133dd253fa1e7aa1aed1eb85604315f34882043411ec48a610695668589c877e96b333b1a7b2ba07304ab0776339edf61cc1b65e358f50489d16259f50dc37d3f997990b699980798aa5430877603717ec5dImmediately isolate the infected system. Perform a full scan with updated security software to remove the threat and any dropped payloads. Thoroughly investigate for persistence mechanisms, C2 communication, and potential data exfiltration or credential compromise, then patch all systems.