General
-
Target
72c59b064cba88f8abb3995ff1c623fe5314d6957b4272d32b2b6f1b85e74525.exe
-
Size
367KB
-
Sample
221216-125hlsaf4x
-
MD5
a9809d7851483b4361b6f1bd85bd9d65
-
SHA1
6b5276635d49e6c96aaaf44c02fa805424f3d4c9
-
SHA256
72c59b064cba88f8abb3995ff1c623fe5314d6957b4272d32b2b6f1b85e74525
-
SHA512
8eb3fe8f7d33da49109617dec513c2eb445fb24ee66f9eae243b56a05d9468045b1fe39572ad386fafcede08d80394c506316d75840c4e2f2c805d61671d6d7f
-
SSDEEP
6144:rYEMnLAagdTvg1/TfKhYA0JMoFlWQwM0isvzpQ6ijLxQFiaI+:lGsagds1/iJuPwMxqzpQ6ijqF
Static task
static1
Behavioral task
behavioral1
Sample
72c59b064cba88f8abb3995ff1c623fe5314d6957b4272d32b2b6f1b85e74525.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72c59b064cba88f8abb3995ff1c623fe5314d6957b4272d32b2b6f1b85e74525.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
amadey
3.60
62.204.41.79/fb73jc3/index.php
62.204.41.13/gjend7w/index.php
Targets
-
-
Target
72c59b064cba88f8abb3995ff1c623fe5314d6957b4272d32b2b6f1b85e74525.exe
-
Size
367KB
-
MD5
a9809d7851483b4361b6f1bd85bd9d65
-
SHA1
6b5276635d49e6c96aaaf44c02fa805424f3d4c9
-
SHA256
72c59b064cba88f8abb3995ff1c623fe5314d6957b4272d32b2b6f1b85e74525
-
SHA512
8eb3fe8f7d33da49109617dec513c2eb445fb24ee66f9eae243b56a05d9468045b1fe39572ad386fafcede08d80394c506316d75840c4e2f2c805d61671d6d7f
-
SSDEEP
6144:rYEMnLAagdTvg1/TfKhYA0JMoFlWQwM0isvzpQ6ijLxQFiaI+:lGsagds1/iJuPwMxqzpQ6ijqF
Score10/10-
Detect Amadey credential stealer module
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-