General
-
Target
c5e31687391c3646e91a257534007a5b1e62bae15e8d3a7950e273ade45bbcde
-
Size
250KB
-
Sample
221201-2e13cabg3v
-
MD5
8961372031d0055becf6b5d53ffae53a
-
SHA1
0081799cf04c3ae04a6af7ad1bce42ac01bcf56a
-
SHA256
c5e31687391c3646e91a257534007a5b1e62bae15e8d3a7950e273ade45bbcde
-
SHA512
59aa7984e26002fffb66d52b482d0b05e439106bf2e5bc36d3d7b06d3ec05510afa2fa421530e4a8e543210abc63bbf360b7e60a202dedd722518b5dc35c26ba
-
SSDEEP
6144:nGKCz3f1PJC7vrQ3QWrJ57aNRcfV3vpCK:nxCzv1PJkIQ+JgLcf/CK
Static task
static1
Behavioral task
behavioral1
Sample
c5e31687391c3646e91a257534007a5b1e62bae15e8d3a7950e273ade45bbcde.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
amadey
3.50
62.204.41.252/nB8cWack3/index.php
Targets
-
-
Target
c5e31687391c3646e91a257534007a5b1e62bae15e8d3a7950e273ade45bbcde
-
Size
250KB
-
MD5
8961372031d0055becf6b5d53ffae53a
-
SHA1
0081799cf04c3ae04a6af7ad1bce42ac01bcf56a
-
SHA256
c5e31687391c3646e91a257534007a5b1e62bae15e8d3a7950e273ade45bbcde
-
SHA512
59aa7984e26002fffb66d52b482d0b05e439106bf2e5bc36d3d7b06d3ec05510afa2fa421530e4a8e543210abc63bbf360b7e60a202dedd722518b5dc35c26ba
-
SSDEEP
6144:nGKCz3f1PJC7vrQ3QWrJ57aNRcfV3vpCK:nxCzv1PJkIQ+JgLcf/CK
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-