General

  • Target

    210d9d14509f0bc2c26c87ba5fef4108

  • Size

    126KB

  • Sample

    220517-wkpzdaaccq

  • MD5

    210d9d14509f0bc2c26c87ba5fef4108

  • SHA1

    8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

  • SHA256

    993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

  • SHA512

    68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

Malware Config

Targets

    • Target

      210d9d14509f0bc2c26c87ba5fef4108

    • Size

      126KB

    • MD5

      210d9d14509f0bc2c26c87ba5fef4108

    • SHA1

      8f4443a8cdfe1ff2156c3a1abd3371e778a2806f

    • SHA256

      993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77

    • SHA512

      68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks