General
-
Target
5108ff329fe6a9fcb9067cafabd6ea642fc59b9e8e0652a99a6bbb4353879b3b
-
Size
247KB
-
Sample
221125-j2qwsach66
-
MD5
c8dd1c31441a00699d5461b1a991c526
-
SHA1
5a8b6ef8b8e2c690106fba85644622ea3c122393
-
SHA256
5108ff329fe6a9fcb9067cafabd6ea642fc59b9e8e0652a99a6bbb4353879b3b
-
SHA512
979699962bca1fdfea02cfc17f87e9051135a20255dd3747923f16dd2a8fb7ec51063a93b19eae049e7d7b7df75a827b9a2d76c86a04b00833185526c44b7afd
-
SSDEEP
6144:c29L9p1+HYR/R0VmJqrjhTj68x9zJFij9N2asHFtz:c29pp1+HYRpMmJa9n68xhJe6HFJ
Static task
static1
Behavioral task
behavioral1
Sample
5108ff329fe6a9fcb9067cafabd6ea642fc59b9e8e0652a99a6bbb4353879b3b.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Targets
-
-
Target
5108ff329fe6a9fcb9067cafabd6ea642fc59b9e8e0652a99a6bbb4353879b3b
-
Size
247KB
-
MD5
c8dd1c31441a00699d5461b1a991c526
-
SHA1
5a8b6ef8b8e2c690106fba85644622ea3c122393
-
SHA256
5108ff329fe6a9fcb9067cafabd6ea642fc59b9e8e0652a99a6bbb4353879b3b
-
SHA512
979699962bca1fdfea02cfc17f87e9051135a20255dd3747923f16dd2a8fb7ec51063a93b19eae049e7d7b7df75a827b9a2d76c86a04b00833185526c44b7afd
-
SSDEEP
6144:c29L9p1+HYR/R0VmJqrjhTj68x9zJFij9N2asHFtz:c29pp1+HYRpMmJa9n68xhJe6HFJ
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-