General
-
Target
file
-
Size
205KB
-
Sample
221126-dmfjlsbg3w
-
MD5
1541ba7e50e778f758fb3d704c8756b7
-
SHA1
95811e024e11472481f1658e72d580ff57c2fc65
-
SHA256
6a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
-
SHA512
29c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b
-
SSDEEP
3072:PQkW/BsH4kSe65KU5smmJOLnF693YLAiw3kzI8zsk43Ni46Zm3k0ShBe:PQG4kNU5mZ3jfkz8kaiDZKk0Shc
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Targets
-
-
Target
file
-
Size
205KB
-
MD5
1541ba7e50e778f758fb3d704c8756b7
-
SHA1
95811e024e11472481f1658e72d580ff57c2fc65
-
SHA256
6a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
-
SHA512
29c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b
-
SSDEEP
3072:PQkW/BsH4kSe65KU5smmJOLnF693YLAiw3kzI8zsk43Ni46Zm3k0ShBe:PQG4kNU5mZ3jfkz8kaiDZKk0Shc
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-