General
-
Target
f1642b45acfb9014b62e9fd1e99bab115dd88fdcd92deb49c3c9a7daaf037bec
-
Size
350KB
-
Sample
221203-h97zlafa63
-
MD5
f4e2403071fd5028745a451c46059b43
-
SHA1
805398d5c4ccd1360d6b7d2190b35a9722b7896c
-
SHA256
f1642b45acfb9014b62e9fd1e99bab115dd88fdcd92deb49c3c9a7daaf037bec
-
SHA512
dc9285ba3351c722f00bd8b688484a3d70fd57f2760d610a229d523252eff5c8868c047e3725b106045841f3a8264fbdc781125fe8f77b3850af8fa330263d48
-
SSDEEP
6144:b76IHkLL82pUcRbIS2QsFnGX2wtvXuR0bAlj8:bW+krpUBU1mR0sd
Static task
static1
Malware Config
Extracted
vidar
56
1148
https://t.me/asifrazatg
https://steamcommunity.com/profiles/76561199439929669
-
profile_id
1148
Extracted
amadey
3.50
62.204.41.252/nB8cWack3/index.php
Extracted
vidar
56
1881
https://t.me/asifrazatg
https://steamcommunity.com/profiles/76561199439929669
-
profile_id
1881
Targets
-
-
Target
f1642b45acfb9014b62e9fd1e99bab115dd88fdcd92deb49c3c9a7daaf037bec
-
Size
350KB
-
MD5
f4e2403071fd5028745a451c46059b43
-
SHA1
805398d5c4ccd1360d6b7d2190b35a9722b7896c
-
SHA256
f1642b45acfb9014b62e9fd1e99bab115dd88fdcd92deb49c3c9a7daaf037bec
-
SHA512
dc9285ba3351c722f00bd8b688484a3d70fd57f2760d610a229d523252eff5c8868c047e3725b106045841f3a8264fbdc781125fe8f77b3850af8fa330263d48
-
SSDEEP
6144:b76IHkLL82pUcRbIS2QsFnGX2wtvXuR0bAlj8:bW+krpUBU1mR0sd
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-