General
-
Target
96e3b187d79ca48041724f0deb1a34d0.exe
-
Size
228KB
-
Sample
221221-vcs6dsfg61
-
MD5
96e3b187d79ca48041724f0deb1a34d0
-
SHA1
32385cc160ef121d45af121ed4a03457405af0a1
-
SHA256
eb4fe6e3e7eb115e84c77a41df0472b1b406e6ec8f6b627fd9c45160631406ad
-
SHA512
98895db413bcb7bd9939fd0c9f52c9b03111c2739fc912d7461d642e20f9ea11bf9790208779db02ea905a82795687fcdf3a5c4125e08cd9dcdb48c2197a5d31
-
SSDEEP
6144:zBmLuSi3En0qq/h5x1t6hvM0hLZqW85gCgmeRu4:9mHGEn0Fh5d6xnRXb8
Static task
static1
Behavioral task
behavioral1
Sample
96e3b187d79ca48041724f0deb1a34d0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96e3b187d79ca48041724f0deb1a34d0.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.63
amadtrackings.com/g9TTnd3bS/index.php
Targets
-
-
Target
96e3b187d79ca48041724f0deb1a34d0.exe
-
Size
228KB
-
MD5
96e3b187d79ca48041724f0deb1a34d0
-
SHA1
32385cc160ef121d45af121ed4a03457405af0a1
-
SHA256
eb4fe6e3e7eb115e84c77a41df0472b1b406e6ec8f6b627fd9c45160631406ad
-
SHA512
98895db413bcb7bd9939fd0c9f52c9b03111c2739fc912d7461d642e20f9ea11bf9790208779db02ea905a82795687fcdf3a5c4125e08cd9dcdb48c2197a5d31
-
SSDEEP
6144:zBmLuSi3En0qq/h5x1t6hvM0hLZqW85gCgmeRu4:9mHGEn0Fh5d6xnRXb8
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-