General
-
Target
4ee2520ed9dc5ab83648b0ff057a7b407a1d4ee5667e3b1ecf5fa750d0e7cdf8
-
Size
233KB
-
Sample
221125-mz9snafb9z
-
MD5
a11cd81b9c09d6c4e68a2b7d5c6e11b6
-
SHA1
c4fdfe503e03863a1ecf4f37ff589e99fd9dc81d
-
SHA256
4ee2520ed9dc5ab83648b0ff057a7b407a1d4ee5667e3b1ecf5fa750d0e7cdf8
-
SHA512
73d8b8a7b52d7523db845d4fe1e5b76ffa2f86627f4e7487275f23e0e8883e3c0c436250121351d9ee7ebd72b357b0c19310c3b17cbee8f42dd316c2e55eae1c
-
SSDEEP
3072:BIeViBSPL/ZGlo5kknJ0icNZPE5HQ9SlBzFEIT8HkTlmvNui+ypgVyEIq5o:isj/s4eF1ERQoEITkkwuzUIx5o
Static task
static1
Behavioral task
behavioral1
Sample
4ee2520ed9dc5ab83648b0ff057a7b407a1d4ee5667e3b1ecf5fa750d0e7cdf8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Targets
-
-
Target
4ee2520ed9dc5ab83648b0ff057a7b407a1d4ee5667e3b1ecf5fa750d0e7cdf8
-
Size
233KB
-
MD5
a11cd81b9c09d6c4e68a2b7d5c6e11b6
-
SHA1
c4fdfe503e03863a1ecf4f37ff589e99fd9dc81d
-
SHA256
4ee2520ed9dc5ab83648b0ff057a7b407a1d4ee5667e3b1ecf5fa750d0e7cdf8
-
SHA512
73d8b8a7b52d7523db845d4fe1e5b76ffa2f86627f4e7487275f23e0e8883e3c0c436250121351d9ee7ebd72b357b0c19310c3b17cbee8f42dd316c2e55eae1c
-
SSDEEP
3072:BIeViBSPL/ZGlo5kknJ0icNZPE5HQ9SlBzFEIT8HkTlmvNui+ypgVyEIq5o:isj/s4eF1ERQoEITkkwuzUIx5o
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-