General
-
Target
file
-
Size
341KB
-
Sample
221122-tnm8vahf73
-
MD5
6cc453d9b8221061d53f9c34ebef469f
-
SHA1
e14679de75a1f05d7949fdaa65cf067b950880d8
-
SHA256
c7b76811efeda9f7f4a71c2ab7723a60e1af9885274e8aef87934a39b7667eb0
-
SHA512
4cd54a0b83faefc0a1938dd1166beaf5c503981ffe82b62922fdb2f9f3f15c944078638d4ff5c0856f7a1ea33fedcd3124845d34028f3cbec151b3928b1f515e
-
SSDEEP
6144:wseitRL5tMvYc9HCYIensB+mo22tThsIeGjY6:cKTYVHCJBs22ZVE
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Targets
-
-
Target
file
-
Size
341KB
-
MD5
6cc453d9b8221061d53f9c34ebef469f
-
SHA1
e14679de75a1f05d7949fdaa65cf067b950880d8
-
SHA256
c7b76811efeda9f7f4a71c2ab7723a60e1af9885274e8aef87934a39b7667eb0
-
SHA512
4cd54a0b83faefc0a1938dd1166beaf5c503981ffe82b62922fdb2f9f3f15c944078638d4ff5c0856f7a1ea33fedcd3124845d34028f3cbec151b3928b1f515e
-
SSDEEP
6144:wseitRL5tMvYc9HCYIensB+mo22tThsIeGjY6:cKTYVHCJBs22ZVE
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-