General

  • Target

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

  • Size

    293KB

  • Sample

    221028-zjwmbafbdl

  • MD5

    3a87456630da7362cc15e14b18047caf

  • SHA1

    7da577c53cfe7cd79c56f7bed9b1ff7d26245075

  • SHA256

    e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

  • SHA512

    881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

  • SSDEEP

    6144:0hKBmh9L7xLmywFKId798LL2oQyerjwb5a:hB+nxUd798LjQyeU5a

Malware Config

Targets

    • Target

      e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    • Size

      293KB

    • MD5

      3a87456630da7362cc15e14b18047caf

    • SHA1

      7da577c53cfe7cd79c56f7bed9b1ff7d26245075

    • SHA256

      e75b6eeeab3631bb5132ff5d8b37274761c9abde15d76c853a8dbd8ce811c46b

    • SHA512

      881a721992076c222c2caefd43ea5fa0b032fe313661989b982d3db7156d8396b9f000ed2b466ca6cbbbc6c6c079a681af8c4dd2e84461ab2a86067c6a395b80

    • SSDEEP

      6144:0hKBmh9L7xLmywFKId798LL2oQyerjwb5a:hB+nxUd798LjQyeU5a

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks