General

  • Target

    32cac8a93cf8d3094bac0a16c46f6f69920239a292aa0e8e0ce034ab72f7f146

  • Size

    361KB

  • Sample

    221102-jv45tsbagp

  • MD5

    aa268b59256692b54889822c3e05d139

  • SHA1

    89460c224ffa21502af9bbcdc0ac8700c5a15ccf

  • SHA256

    32cac8a93cf8d3094bac0a16c46f6f69920239a292aa0e8e0ce034ab72f7f146

  • SHA512

    761f48358dbd6717f4831a01246d9d5900b70c9d48046c770df1138b5e9c66748931ea7511c3b031d8e939b4e48bc50fabf90b5dfc89be733af1eb9242934327

  • SSDEEP

    6144:Z8jLcBetfd2op6R47hSvhEAhf6jhrQ7ITsq4:Z80Be72j47Ih/N6dk75

Malware Config

Targets

    • Target

      32cac8a93cf8d3094bac0a16c46f6f69920239a292aa0e8e0ce034ab72f7f146

    • Size

      361KB

    • MD5

      aa268b59256692b54889822c3e05d139

    • SHA1

      89460c224ffa21502af9bbcdc0ac8700c5a15ccf

    • SHA256

      32cac8a93cf8d3094bac0a16c46f6f69920239a292aa0e8e0ce034ab72f7f146

    • SHA512

      761f48358dbd6717f4831a01246d9d5900b70c9d48046c770df1138b5e9c66748931ea7511c3b031d8e939b4e48bc50fabf90b5dfc89be733af1eb9242934327

    • SSDEEP

      6144:Z8jLcBetfd2op6R47hSvhEAhf6jhrQ7ITsq4:Z80Be72j47Ih/N6dk75

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks