General
-
Target
file.exe
-
Size
415KB
-
Sample
221206-wqwn4sbc56
-
MD5
53fe800cca4aa213dd197711d2119374
-
SHA1
88d55f9d97a489939357c5851caae23198d7e362
-
SHA256
1132d3d40f22922064a9f284e9a1d6e7fa438aaf64c1ff38859013002adf29be
-
SHA512
86b7a985c18205d46e00fea8955c7b6e29a5077b17ab89b40c5e570072af977b15677d64551ab02bde7da371f103ffdc557c861afdbcfde28545abc178fbbe78
-
SSDEEP
6144:DBcAZRfLv46PpYCTszDh6GgBPezRuHanHEH1vGeF1172WcoBlCjdnaV:DBrZNL46RT6DG/H1d11NcWC5n
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.50
31.41.244.167/v7eWcjs/index.php
Targets
-
-
Target
file.exe
-
Size
415KB
-
MD5
53fe800cca4aa213dd197711d2119374
-
SHA1
88d55f9d97a489939357c5851caae23198d7e362
-
SHA256
1132d3d40f22922064a9f284e9a1d6e7fa438aaf64c1ff38859013002adf29be
-
SHA512
86b7a985c18205d46e00fea8955c7b6e29a5077b17ab89b40c5e570072af977b15677d64551ab02bde7da371f103ffdc557c861afdbcfde28545abc178fbbe78
-
SSDEEP
6144:DBcAZRfLv46PpYCTszDh6GgBPezRuHanHEH1vGeF1172WcoBlCjdnaV:DBrZNL46RT6DG/H1d11NcWC5n
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-