General
-
Target
file.exe
-
Size
205KB
-
Sample
221126-j29znaea47
-
MD5
e3cd29457749bbcd912dbc06ff4e96e8
-
SHA1
10cda0f6139e72854a4c2cdef53e6ee8eccf7b83
-
SHA256
5f22145a6c9eaf18ed703c43b3b8f03b1db4dab9218e06ecbf3d82ae9f9e4d10
-
SHA512
5110f1f48c61ec1b188c1a665fe840ab589b660590192e77d0f2c2022eb8acb3766217585fb9f8050d6fc1652752472c78daf60c67f9ae4343b9cd226d6effed
-
SSDEEP
3072:cpJD+C3LqEQFnHal65mOoZq72/KXxbMvCceciAOnEaa/bJH9DGYKPv/X9HU9bKtN:IT3LqEQVA/Q6+x7cecijH67abWa7
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Targets
-
-
Target
file.exe
-
Size
205KB
-
MD5
e3cd29457749bbcd912dbc06ff4e96e8
-
SHA1
10cda0f6139e72854a4c2cdef53e6ee8eccf7b83
-
SHA256
5f22145a6c9eaf18ed703c43b3b8f03b1db4dab9218e06ecbf3d82ae9f9e4d10
-
SHA512
5110f1f48c61ec1b188c1a665fe840ab589b660590192e77d0f2c2022eb8acb3766217585fb9f8050d6fc1652752472c78daf60c67f9ae4343b9cd226d6effed
-
SSDEEP
3072:cpJD+C3LqEQFnHal65mOoZq72/KXxbMvCceciAOnEaa/bJH9DGYKPv/X9HU9bKtN:IT3LqEQVA/Q6+x7cecijH67abWa7
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-