General
-
Target
1bf49a4ea5a112dd6a7c8776bb3957b317b573474184aff11f9b0dfaa2f12140
-
Size
317KB
-
Sample
221128-lvb56adh29
-
MD5
3d44ffb12f932d6c9ad85a55f83bb7b7
-
SHA1
5cb00a782d499c8d6c633f2ed941dd7e31db471c
-
SHA256
1bf49a4ea5a112dd6a7c8776bb3957b317b573474184aff11f9b0dfaa2f12140
-
SHA512
0b81a503d2fe5f985a137baa5fadd5f67edd01b5bab170c15061266309f59deda90e6ad069c9815f60b854a9a948c21c4427c258777172bd22d27c3875efa0c8
-
SSDEEP
6144:HuYgZSrBxlCndgbS5Iu54EZjKsYt88UkHhSfbr5:HcMrBxlCdSS+EZOf68BH0fbr
Static task
static1
Behavioral task
behavioral1
Sample
1bf49a4ea5a112dd6a7c8776bb3957b317b573474184aff11f9b0dfaa2f12140.exe
Resource
win10-20220901-en
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Targets
-
-
Target
1bf49a4ea5a112dd6a7c8776bb3957b317b573474184aff11f9b0dfaa2f12140
-
Size
317KB
-
MD5
3d44ffb12f932d6c9ad85a55f83bb7b7
-
SHA1
5cb00a782d499c8d6c633f2ed941dd7e31db471c
-
SHA256
1bf49a4ea5a112dd6a7c8776bb3957b317b573474184aff11f9b0dfaa2f12140
-
SHA512
0b81a503d2fe5f985a137baa5fadd5f67edd01b5bab170c15061266309f59deda90e6ad069c9815f60b854a9a948c21c4427c258777172bd22d27c3875efa0c8
-
SSDEEP
6144:HuYgZSrBxlCndgbS5Iu54EZjKsYt88UkHhSfbr5:HcMrBxlCdSS+EZOf68BH0fbr
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-