General

  • Target

    0cbdd0ceb700d66ffd0494f3a8158c946f586307d32f0e50460d6647e7d5f867

  • Size

    950KB

  • Sample

    230415-2fcfdaga45

  • MD5

    b0d27dcc802402b5fb7c4ff6bca1de47

  • SHA1

    02dd733b67cb7e46032736a595489ca83969a4c7

  • SHA256

    0cbdd0ceb700d66ffd0494f3a8158c946f586307d32f0e50460d6647e7d5f867

  • SHA512

    978c35b2b23bcd2e730b0b3acab2c8bddc89fb05042d39595d5786b9d5f05139a0f7e1c526fdaa8a93b367c6a6dccc5220febcf570e5c8e10b9bdc6c3145465b

  • SSDEEP

    24576:0yEHOTjzstexPUd+VzI8nYqFHEjq2xYebDw1vVx:DsQXxMw8tw+q2xYqc19

Malware Config

Targets

    • Target

      0cbdd0ceb700d66ffd0494f3a8158c946f586307d32f0e50460d6647e7d5f867

    • Size

      950KB

    • MD5

      b0d27dcc802402b5fb7c4ff6bca1de47

    • SHA1

      02dd733b67cb7e46032736a595489ca83969a4c7

    • SHA256

      0cbdd0ceb700d66ffd0494f3a8158c946f586307d32f0e50460d6647e7d5f867

    • SHA512

      978c35b2b23bcd2e730b0b3acab2c8bddc89fb05042d39595d5786b9d5f05139a0f7e1c526fdaa8a93b367c6a6dccc5220febcf570e5c8e10b9bdc6c3145465b

    • SSDEEP

      24576:0yEHOTjzstexPUd+VzI8nYqFHEjq2xYebDw1vVx:DsQXxMw8tw+q2xYqc19

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks