General
-
Target
file
-
Size
246KB
-
Sample
221124-jzaf1sae36
-
MD5
86beaf6105ca75a1bb34b81e7e8de4f9
-
SHA1
f09e9c0074eab1826d45cc654947f93eebd86005
-
SHA256
dfeb0c4fc9c5d9a2b02a742a6d4e3c090693fc3cf8a3f83d81097014127931de
-
SHA512
6a3cce74bf4ba74058ec8aa7e6a90abfb534ca7bad81e7017c4334280e8d46c554eb2ebcbd3374e5b46068d296c8de57f11af79db7849b0f0cd4ed155ef57556
-
SSDEEP
3072:pyPOSyXJkedl4Lb7M33FM+57Onfx+wVN2jVRPY2BIjeGq9tw4KZM7oIPCUTR3stt:eOOC4LnM31oxoTY2OjZydDrZsL8n0
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Targets
-
-
Target
file
-
Size
246KB
-
MD5
86beaf6105ca75a1bb34b81e7e8de4f9
-
SHA1
f09e9c0074eab1826d45cc654947f93eebd86005
-
SHA256
dfeb0c4fc9c5d9a2b02a742a6d4e3c090693fc3cf8a3f83d81097014127931de
-
SHA512
6a3cce74bf4ba74058ec8aa7e6a90abfb534ca7bad81e7017c4334280e8d46c554eb2ebcbd3374e5b46068d296c8de57f11af79db7849b0f0cd4ed155ef57556
-
SSDEEP
3072:pyPOSyXJkedl4Lb7M33FM+57Onfx+wVN2jVRPY2BIjeGq9tw4KZM7oIPCUTR3stt:eOOC4LnM31oxoTY2OjZydDrZsL8n0
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-