General

  • Target

    file

  • Size

    360KB

  • Sample

    221102-tq9jvsabf9

  • MD5

    0301518973aa3a712b53cf11c3bb4e73

  • SHA1

    e44b8f34103f3740cc793bdd2cae7a75947011e4

  • SHA256

    aaddb339786a1d241ae3ce30da09f9ae6a53338c92c4cab7f6f6827aa59d27e3

  • SHA512

    2127614e440d4d9c2665ff8eb6adec3013203448c5e1022d64651c74c8c2575fdcf19b84718ab6be8801ad4824ebfe6c1f3b83b48df3987fe519278e50adb561

  • SSDEEP

    3072:obC8rA+kGo1ilPUh52lPUcnZ3zXEkhVGgnRnNxua1sZd6G8rITbhsgtSVggjcGke:v8rArixtPRZ3zXY8JzugsHzVuv7ITsq

Malware Config

Targets

    • Target

      file

    • Size

      360KB

    • MD5

      0301518973aa3a712b53cf11c3bb4e73

    • SHA1

      e44b8f34103f3740cc793bdd2cae7a75947011e4

    • SHA256

      aaddb339786a1d241ae3ce30da09f9ae6a53338c92c4cab7f6f6827aa59d27e3

    • SHA512

      2127614e440d4d9c2665ff8eb6adec3013203448c5e1022d64651c74c8c2575fdcf19b84718ab6be8801ad4824ebfe6c1f3b83b48df3987fe519278e50adb561

    • SSDEEP

      3072:obC8rA+kGo1ilPUh52lPUcnZ3zXEkhVGgnRnNxua1sZd6G8rITbhsgtSVggjcGke:v8rArixtPRZ3zXY8JzugsHzVuv7ITsq

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks