General

  • Target

    e7da510639a06b3c886656d24131f84535896b412c3ce5ad966b32d2830190bf

  • Size

    324KB

  • Sample

    221106-y2b5yscfak

  • MD5

    7ed1d1c6972a92f97697465c465be8ba

  • SHA1

    da5190fe64e65e1de39acc337ef77e2c942c3653

  • SHA256

    e7da510639a06b3c886656d24131f84535896b412c3ce5ad966b32d2830190bf

  • SHA512

    676adabd6a19b4e846e4682ca8f67539798821143dd57d47788b678be879dcbdea27b9d7fe0d95b5369f6614acfd7a088b80f66cb5190dc5da9ea6844a1ab192

  • SSDEEP

    6144:L1nK/fju+geevVSOy7htMhie3REaF2QA3Pa:RnKXyTee95Y+tJ1AS

Malware Config

Targets

    • Target

      e7da510639a06b3c886656d24131f84535896b412c3ce5ad966b32d2830190bf

    • Size

      324KB

    • MD5

      7ed1d1c6972a92f97697465c465be8ba

    • SHA1

      da5190fe64e65e1de39acc337ef77e2c942c3653

    • SHA256

      e7da510639a06b3c886656d24131f84535896b412c3ce5ad966b32d2830190bf

    • SHA512

      676adabd6a19b4e846e4682ca8f67539798821143dd57d47788b678be879dcbdea27b9d7fe0d95b5369f6614acfd7a088b80f66cb5190dc5da9ea6844a1ab192

    • SSDEEP

      6144:L1nK/fju+geevVSOy7htMhie3REaF2QA3Pa:RnKXyTee95Y+tJ1AS

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks