General
-
Target
dfe955ab261dff65d5bfc3989342fb0bb9d4418485889a8b8062fef8eb5be708
-
Size
780KB
-
Sample
221125-xehhsafg24
-
MD5
d53cf9d2e7b6410bec5b8960643cbbc8
-
SHA1
55afb898ddcb5ef0af47ba7a82d8b820d7496dd6
-
SHA256
dfe955ab261dff65d5bfc3989342fb0bb9d4418485889a8b8062fef8eb5be708
-
SHA512
d5605e3f6160192b739aad221512307767d38984512f0dd917403daf9111f0d71c3305128fe0e0365cd5f180349146fba02006d646ae8793461459d6e2baa1b2
-
SSDEEP
12288:M7T+kWJc7161BOrx4l/7B1pVqfjKd1OWUsIOiizzMRK34+NBR:MnVr71OK8Dn2bKLYlizz0K3x
Static task
static1
Behavioral task
behavioral1
Sample
dfe955ab261dff65d5bfc3989342fb0bb9d4418485889a8b8062fef8eb5be708.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
amadey
3.50
77.73.134.65/o7VsjdSa2f/index.php
Targets
-
-
Target
dfe955ab261dff65d5bfc3989342fb0bb9d4418485889a8b8062fef8eb5be708
-
Size
780KB
-
MD5
d53cf9d2e7b6410bec5b8960643cbbc8
-
SHA1
55afb898ddcb5ef0af47ba7a82d8b820d7496dd6
-
SHA256
dfe955ab261dff65d5bfc3989342fb0bb9d4418485889a8b8062fef8eb5be708
-
SHA512
d5605e3f6160192b739aad221512307767d38984512f0dd917403daf9111f0d71c3305128fe0e0365cd5f180349146fba02006d646ae8793461459d6e2baa1b2
-
SSDEEP
12288:M7T+kWJc7161BOrx4l/7B1pVqfjKd1OWUsIOiizzMRK34+NBR:MnVr71OK8Dn2bKLYlizz0K3x
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-