General

  • Target

    2ab8e316e1e8c3a30861a1e2ee2598c4b3de3dd39470472012b694b0ef8ae6dc

  • Size

    1.1MB

  • Sample

    230415-3xw2sahg8z

  • MD5

    fafa9802616811155655be6dfe9292bb

  • SHA1

    f674f308c3bd500e57c9ace5ab6840f5794b8801

  • SHA256

    2ab8e316e1e8c3a30861a1e2ee2598c4b3de3dd39470472012b694b0ef8ae6dc

  • SHA512

    aba8bf1af2767c470992e34bffb3635293821a11b57dff27e2ff64a249eb7be870745735dcf0b806920eedeff971950191724219021dc16471fc0356c9b343a5

  • SSDEEP

    24576:6y3yxgQC3piV44m1m5bCQ8OaHA0Np9WexSqFWU5uXQUzg6MKg1d:BCxgQC3piJxJblaHnWF/iuXri

Malware Config

Targets

    • Target

      2ab8e316e1e8c3a30861a1e2ee2598c4b3de3dd39470472012b694b0ef8ae6dc

    • Size

      1.1MB

    • MD5

      fafa9802616811155655be6dfe9292bb

    • SHA1

      f674f308c3bd500e57c9ace5ab6840f5794b8801

    • SHA256

      2ab8e316e1e8c3a30861a1e2ee2598c4b3de3dd39470472012b694b0ef8ae6dc

    • SHA512

      aba8bf1af2767c470992e34bffb3635293821a11b57dff27e2ff64a249eb7be870745735dcf0b806920eedeff971950191724219021dc16471fc0356c9b343a5

    • SSDEEP

      24576:6y3yxgQC3piV44m1m5bCQ8OaHA0Np9WexSqFWU5uXQUzg6MKg1d:BCxgQC3piJxJblaHnWF/iuXri

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks