General
-
Target
dbf7ab4ef7a4cc1f1b0ac52a5622a327.exe
-
Size
359KB
-
Sample
221101-hs782aaadj
-
MD5
dbf7ab4ef7a4cc1f1b0ac52a5622a327
-
SHA1
9464e63db2e47bd2e17f9cedb36d3f0329ef0aca
-
SHA256
f9a86b36662d5368b7fa453b89553b9cbb6673c35fe7d6e382076fbc03b85a4c
-
SHA512
0917da310a3cc553bb12eabeeda95fc527cface4b8da39903b8bd35adac4b48e3fe07f6c92d76cf7aae914864777a6e38a0567def4c97dbba27a6aca917741b5
-
SSDEEP
6144:Ww5Sfm+/+T6XuTSPueQHC8O/ITVpRYHlytNO7ITsq:Ww5em+/+TZTtiNI5IFyzO7
Static task
static1
Behavioral task
behavioral1
Sample
dbf7ab4ef7a4cc1f1b0ac52a5622a327.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbf7ab4ef7a4cc1f1b0ac52a5622a327.exe
Resource
win10v2004-20220901-en
Malware Config
Targets
-
-
Target
dbf7ab4ef7a4cc1f1b0ac52a5622a327.exe
-
Size
359KB
-
MD5
dbf7ab4ef7a4cc1f1b0ac52a5622a327
-
SHA1
9464e63db2e47bd2e17f9cedb36d3f0329ef0aca
-
SHA256
f9a86b36662d5368b7fa453b89553b9cbb6673c35fe7d6e382076fbc03b85a4c
-
SHA512
0917da310a3cc553bb12eabeeda95fc527cface4b8da39903b8bd35adac4b48e3fe07f6c92d76cf7aae914864777a6e38a0567def4c97dbba27a6aca917741b5
-
SSDEEP
6144:Ww5Sfm+/+T6XuTSPueQHC8O/ITVpRYHlytNO7ITsq:Ww5em+/+TZTtiNI5IFyzO7
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-