General
-
Target
441e2f26fb49f9e163d634b5726e559ad2b8a2b33410a11aea7b12bcbd9eec09
-
Size
248KB
-
Sample
221124-3yetwsbg31
-
MD5
12e5d04bd1499ce6479769d28412cae2
-
SHA1
0b6b734c8485840765563cf4f986bcb63c71cb7e
-
SHA256
441e2f26fb49f9e163d634b5726e559ad2b8a2b33410a11aea7b12bcbd9eec09
-
SHA512
d420eba6e6c6f05f739b4684caca43049fb5f5dd835f9d18190dfb3c8f38a00de3681a42b01918e6e3f638d82ecc445e970143fdbd905d37e297e939605f92ab
-
SSDEEP
6144:r9cLYyFDnA2y1w1Tel+z5y5PxpwgJCoG/rBc:r9ckcDA3SaE1EIoG/u
Static task
static1
Behavioral task
behavioral1
Sample
441e2f26fb49f9e163d634b5726e559ad2b8a2b33410a11aea7b12bcbd9eec09.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Targets
-
-
Target
441e2f26fb49f9e163d634b5726e559ad2b8a2b33410a11aea7b12bcbd9eec09
-
Size
248KB
-
MD5
12e5d04bd1499ce6479769d28412cae2
-
SHA1
0b6b734c8485840765563cf4f986bcb63c71cb7e
-
SHA256
441e2f26fb49f9e163d634b5726e559ad2b8a2b33410a11aea7b12bcbd9eec09
-
SHA512
d420eba6e6c6f05f739b4684caca43049fb5f5dd835f9d18190dfb3c8f38a00de3681a42b01918e6e3f638d82ecc445e970143fdbd905d37e297e939605f92ab
-
SSDEEP
6144:r9cLYyFDnA2y1w1Tel+z5y5PxpwgJCoG/rBc:r9ckcDA3SaE1EIoG/u
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-