General

  • Target

    tmp

  • Size

    320KB

  • Sample

    221001-rmgzbshbcm

  • MD5

    1aaea333f1a2b0870df8c506b237eff7

  • SHA1

    5f94408a89c401e2a3d7f59d03c1b98d68d855e2

  • SHA256

    0321da385d5c03cea287316cabb9190060cdb444a9816121ede86ec31bcbfdc7

  • SHA512

    e717f1abb1215a7323dc12e79ef55e926bbb4181e4a77677460cb7289a812536f745828dd06029245fb1cfdd689e42941a7e1ae70fbbf6655b27f7d168e62328

  • SSDEEP

    6144:GfEB4rDaA1co4Ql1YDuYEktDiaAQq26IMJ7nzf5mMO+Cv4M60kWwU:Gu4z1coh3YDuYEktvZFyrrzPCZjknU

Malware Config

Targets

    • Target

      tmp

    • Size

      320KB

    • MD5

      1aaea333f1a2b0870df8c506b237eff7

    • SHA1

      5f94408a89c401e2a3d7f59d03c1b98d68d855e2

    • SHA256

      0321da385d5c03cea287316cabb9190060cdb444a9816121ede86ec31bcbfdc7

    • SHA512

      e717f1abb1215a7323dc12e79ef55e926bbb4181e4a77677460cb7289a812536f745828dd06029245fb1cfdd689e42941a7e1ae70fbbf6655b27f7d168e62328

    • SSDEEP

      6144:GfEB4rDaA1co4Ql1YDuYEktDiaAQq26IMJ7nzf5mMO+Cv4M60kWwU:Gu4z1coh3YDuYEktvZFyrrzPCZjknU

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks