General
-
Target
a947f12146bac968e04f955ec03fd56e7f94343b98f9b49eb988e9b6aefc3f8f
-
Size
423KB
-
Sample
221206-138lnabg6s
-
MD5
9e9df779a547699c79f19a29a4ec7650
-
SHA1
5b2aa643807e06dd7064fc94a997e44b213c6163
-
SHA256
a947f12146bac968e04f955ec03fd56e7f94343b98f9b49eb988e9b6aefc3f8f
-
SHA512
78798143c34ed26ad0278162aee244670385f33b9666e7b038b51f3bc9bfda74fac4459a0369f707311fc171d4302a6d4229c2d08a0063bc137cb48841317638
-
SSDEEP
6144:wCbqZQLNLxw5KUYAilo5CCQllUuyMTljofAWcoBlC7NOUs0yaVe:wC+Z6NFw5p2Cb8lobcWC7NOH3
Static task
static1
Behavioral task
behavioral1
Sample
a947f12146bac968e04f955ec03fd56e7f94343b98f9b49eb988e9b6aefc3f8f.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Targets
-
-
Target
a947f12146bac968e04f955ec03fd56e7f94343b98f9b49eb988e9b6aefc3f8f
-
Size
423KB
-
MD5
9e9df779a547699c79f19a29a4ec7650
-
SHA1
5b2aa643807e06dd7064fc94a997e44b213c6163
-
SHA256
a947f12146bac968e04f955ec03fd56e7f94343b98f9b49eb988e9b6aefc3f8f
-
SHA512
78798143c34ed26ad0278162aee244670385f33b9666e7b038b51f3bc9bfda74fac4459a0369f707311fc171d4302a6d4229c2d08a0063bc137cb48841317638
-
SSDEEP
6144:wCbqZQLNLxw5KUYAilo5CCQllUuyMTljofAWcoBlC7NOUs0yaVe:wC+Z6NFw5p2Cb8lobcWC7NOH3
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-