General

  • Target

    a6b90399f2e235c93066468219451892.exe

  • Size

    240KB

  • Sample

    221107-nb1qhsdah5

  • MD5

    a6b90399f2e235c93066468219451892

  • SHA1

    89f80cd22ee36f1cc2793328f9e8abfc6d8645e9

  • SHA256

    21492816e070532cf9309ac5f1b9a98347a389e7b4cc237541a917d7cdd50eca

  • SHA512

    aace4752bef09f37a4a1fe63b21092db93917a47d5089e218a7363aa03f143753caddd0576fb9abb03ef39754e8a3c89e6ab7dc383763260fc4bab19ddd21931

  • SSDEEP

    3072:K/0j8Wu9joj1IB+9S/TLnyKNvyQL5dWmb9cy0V/qzM0MaeJkI8RVvwW8qwxGzYMN:KM8h9IEL1yom64n3JVWp8a0Z

Malware Config

Targets

    • Target

      a6b90399f2e235c93066468219451892.exe

    • Size

      240KB

    • MD5

      a6b90399f2e235c93066468219451892

    • SHA1

      89f80cd22ee36f1cc2793328f9e8abfc6d8645e9

    • SHA256

      21492816e070532cf9309ac5f1b9a98347a389e7b4cc237541a917d7cdd50eca

    • SHA512

      aace4752bef09f37a4a1fe63b21092db93917a47d5089e218a7363aa03f143753caddd0576fb9abb03ef39754e8a3c89e6ab7dc383763260fc4bab19ddd21931

    • SSDEEP

      3072:K/0j8Wu9joj1IB+9S/TLnyKNvyQL5dWmb9cy0V/qzM0MaeJkI8RVvwW8qwxGzYMN:KM8h9IEL1yom64n3JVWp8a0Z

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Enterprise v6

Tasks