Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Amadey
This detection identifies the Amadey trojan, a botnet malware capable of stealing information and downloading additional malicious payloads. The behavioral analysis indicates it uses legitimate Windows tools like PowerShell, BITS, and Scheduled Tasks to execute code, download files, and establish persistence on the infected system.
Relevant strings associated with this threat: - TEMP\pixelsee-installer-tmp (PEHSTR_EXT) - MediaGet\mediaget.exe (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
rule Trojan_Win32_Amadey_AMY_2147850644_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/Amadey.AMY!MTB"
threat_id = "2147850644"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "Amadey"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "1"
strings_accuracy = "High"
strings:
$x_1_1 = {42 69 f6 91 e9 d1 5b 8b c1 c1 e8 18 33 c1 69 c8 91 e9 d1 5b 33 f1 3b d3} //weight: 1, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}60acc48765bbe492e56f8e1665bf041973f23501422a73fd87dd2b79922246b6Isolate the affected machine from the network to prevent lateral movement. Run a full system scan with an updated antivirus solution to remove the malware. Review and remove persistence mechanisms such as scheduled tasks and suspicious startup entries, then change all user credentials.