General

  • Target

    c6ee925f86d52471e052854182af14fa5b7e02dbf095d0f20d509fbc2bb74d2e

  • Size

    1.1MB

  • Sample

    230415-tlwr7sef88

  • MD5

    c9a64d77c42c8ea17c74b374d7600a7e

  • SHA1

    07c724386ab5f7b17216190ed2d3aef417d6f918

  • SHA256

    c6ee925f86d52471e052854182af14fa5b7e02dbf095d0f20d509fbc2bb74d2e

  • SHA512

    277582a869a82fd52ca42532acc412128474c36a429e4591a5ffc336a2185b4318f449e0e61fe02d1f965179698baeafaf97decb62ccb86f0efbf33a3faaee33

  • SSDEEP

    12288:Ty90Ra7lhH4un0LXdEQINSUgsSmad9FWgDsoxm6LlIF6Y/x5gsmtwQv648lp+LA2:Ty37vH5+uoCadDxhxInPmmdeyAiTO

Malware Config

Targets

    • Target

      c6ee925f86d52471e052854182af14fa5b7e02dbf095d0f20d509fbc2bb74d2e

    • Size

      1.1MB

    • MD5

      c9a64d77c42c8ea17c74b374d7600a7e

    • SHA1

      07c724386ab5f7b17216190ed2d3aef417d6f918

    • SHA256

      c6ee925f86d52471e052854182af14fa5b7e02dbf095d0f20d509fbc2bb74d2e

    • SHA512

      277582a869a82fd52ca42532acc412128474c36a429e4591a5ffc336a2185b4318f449e0e61fe02d1f965179698baeafaf97decb62ccb86f0efbf33a3faaee33

    • SSDEEP

      12288:Ty90Ra7lhH4un0LXdEQINSUgsSmad9FWgDsoxm6LlIF6Y/x5gsmtwQv648lp+LA2:Ty37vH5+uoCadDxhxInPmmdeyAiTO

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks