General
-
Target
b7842ab0ab8222d82bc85fed657c6b654934273c8879bc54a514ed1b11f4dc4c
-
Size
164KB
-
Sample
221129-vfkcnagc87
-
MD5
fe043bb58c3824ec683c86c26108b530
-
SHA1
7ed97d5223786608142f58ab90880f2f68c0b8ca
-
SHA256
33dbd38c8cd1a622973ede037e6dea53dd54fd1f0e24dda5f04961a0b156e356
-
SHA512
d80129dcdd8770b19b9e51cb900354ec5f5ae0462c98c740daeecd5ada6d660936fd18c23449ac08a848421bf6681eb65fe76ad212638e73e14500b3c4110ec6
-
SSDEEP
3072:hd+o78PPnoVguSLaICi8Cz4SebdwvboQ5IxMLKtuoxuzsJ5l+8Wr:hoo44PS1CucyvboQOxwbkPw
Static task
static1
Behavioral task
behavioral1
Sample
b7842ab0ab8222d82bc85fed657c6b654934273c8879bc54a514ed1b11f4dc4c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7842ab0ab8222d82bc85fed657c6b654934273c8879bc54a514ed1b11f4dc4c.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Targets
-
-
Target
b7842ab0ab8222d82bc85fed657c6b654934273c8879bc54a514ed1b11f4dc4c
-
Size
205KB
-
MD5
6ebe673b67f6e09ebc8d12c1c2228820
-
SHA1
9c31a26fdc6ad270a35dbab8c65c69a5f32fcc59
-
SHA256
b7842ab0ab8222d82bc85fed657c6b654934273c8879bc54a514ed1b11f4dc4c
-
SHA512
5459fa4ab307c9bb8807050fdd2e9334e73cdd9efd814977596d213d17ee122648468f8b383f45d0098905d2d62cb02fc9edb4fa6588aaff4ee1f66993d75640
-
SSDEEP
3072:xEDbGq+SNqbj37y5mKSLaICiuCz4SebdwvboQ5Ix2LKtuskzp8UtNc+D:2Gq+sa3CS1CqcyvboQOxKsstT
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-