General
-
Target
7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb
-
Size
244KB
-
Sample
230101-17ty3aga2t
-
MD5
20f88f67297070067a7cf9a17bcd8904
-
SHA1
3bcf47df92c2ace9ddc71c25d520e323743467bf
-
SHA256
7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb
-
SHA512
ba359e439795bd1d2bd8a1b33169920da2a348e24e68785326f59f47c0b0821eae7d0010297c9b387313794a280d1e823fd9915dc874cf2ada60364c6e1871f6
-
SSDEEP
6144:l324aAQaiCam1I3zCtZf/NPPoNqgu1yGfIwHE:lDEmV7f/9ozu1yo
Behavioral task
behavioral1
Sample
7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb.exe
Resource
win10-20220812-en
Malware Config
Extracted
amadey
3.63
45.32.200.113/mBsjv2swweP/index.php
Targets
-
-
Target
7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb
-
Size
244KB
-
MD5
20f88f67297070067a7cf9a17bcd8904
-
SHA1
3bcf47df92c2ace9ddc71c25d520e323743467bf
-
SHA256
7812b5f5fd710358255d8847f61729386cb982c55beb12a77e240d3377aaeafb
-
SHA512
ba359e439795bd1d2bd8a1b33169920da2a348e24e68785326f59f47c0b0821eae7d0010297c9b387313794a280d1e823fd9915dc874cf2ada60364c6e1871f6
-
SSDEEP
6144:l324aAQaiCam1I3zCtZf/NPPoNqgu1yGfIwHE:lDEmV7f/9ozu1yo
Score10/10-
Detect Amadey credential stealer module
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-