General
-
Target
63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7
-
Size
417KB
-
Sample
221206-m3b1ssbd66
-
MD5
6ec87ebea87e5e9aa7e1961eb45763fc
-
SHA1
a543356fd5d7bb2674e21a272839c23c6f50859d
-
SHA256
63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7
-
SHA512
e30e0e6435607ab7d5be9201ad551a697c6e8fa499fb07d229400ee8d2d0ae18fcc739f42142a587d2496e2d19602e159fe87512fc7c40b3d71883bb62ff60c5
-
SSDEEP
6144:ZchyyvLDAN1kbT+SwR7zxZVi5+yig7OARlPMk:ZcygfAN1kItVLyz
Static task
static1
Behavioral task
behavioral1
Sample
63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Targets
-
-
Target
63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7
-
Size
417KB
-
MD5
6ec87ebea87e5e9aa7e1961eb45763fc
-
SHA1
a543356fd5d7bb2674e21a272839c23c6f50859d
-
SHA256
63900e29e37f5cb0f1e6582a3bc52a48c5d2c1cae6842cb3076528dff1016ef7
-
SHA512
e30e0e6435607ab7d5be9201ad551a697c6e8fa499fb07d229400ee8d2d0ae18fcc739f42142a587d2496e2d19602e159fe87512fc7c40b3d71883bb62ff60c5
-
SSDEEP
6144:ZchyyvLDAN1kbT+SwR7zxZVi5+yig7OARlPMk:ZcygfAN1kItVLyz
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-