General

  • Target

    file

  • Size

    341KB

  • Sample

    221104-yahtesccbl

  • MD5

    5cdc21b76515818eab8015a77bfd05be

  • SHA1

    6232fba45109a100b329aa1bc20e73e9537bc1de

  • SHA256

    6167d8e3c5bb50cbd6ffce148596e8d12924f389c1f82ca956710a02239ab8eb

  • SHA512

    3f4d1d4aaa8a6859894136fd425619c48ae4f0ce20b4130b9949e6230c70a7c071f1dafe6129711de278e6f60fd7b9d4eef6e61278ebbc193a635d9bdd3beeeb

  • SSDEEP

    3072:vxXJTxXYZxP5F5tEbbcAJnPl/1QW1HDwPFK/DXFYMg+4Kx+bVT:5XJTsBoTtNBj7WKx+1

Malware Config

Targets

    • Target

      file

    • Size

      341KB

    • MD5

      5cdc21b76515818eab8015a77bfd05be

    • SHA1

      6232fba45109a100b329aa1bc20e73e9537bc1de

    • SHA256

      6167d8e3c5bb50cbd6ffce148596e8d12924f389c1f82ca956710a02239ab8eb

    • SHA512

      3f4d1d4aaa8a6859894136fd425619c48ae4f0ce20b4130b9949e6230c70a7c071f1dafe6129711de278e6f60fd7b9d4eef6e61278ebbc193a635d9bdd3beeeb

    • SSDEEP

      3072:vxXJTxXYZxP5F5tEbbcAJnPl/1QW1HDwPFK/DXFYMg+4Kx+bVT:5XJTsBoTtNBj7WKx+1

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks