General

  • Target

    040d49edffbebd146fa2fe2014b320dfc737de2c3a0356661c0d3b9d65dd755c

  • Size

    1.1MB

  • Sample

    230418-j8er4acb4t

  • MD5

    5d2ff72fd0138d23e76d5b10dd49f935

  • SHA1

    af3a6a41d40bf391a616c2f82147b6fa3b542e13

  • SHA256

    040d49edffbebd146fa2fe2014b320dfc737de2c3a0356661c0d3b9d65dd755c

  • SHA512

    8fa359fa5b2f7ee56d40439f8b3072268b18a2c9ec12cd80ff1fbe146554340cd18c5273cac07a0b91e2dae2ecb7ffa2fa708aa2bfb65f41fd0b2e28b17b50a2

  • SSDEEP

    24576:FySXne/EexeN5n99VgZSHrjBr2spIWeynBPHvNg0G/ftHWdSLa:gSXe/Eecr7DjBrVInyBflS2dSL

Malware Config

Targets

    • Target

      040d49edffbebd146fa2fe2014b320dfc737de2c3a0356661c0d3b9d65dd755c

    • Size

      1.1MB

    • MD5

      5d2ff72fd0138d23e76d5b10dd49f935

    • SHA1

      af3a6a41d40bf391a616c2f82147b6fa3b542e13

    • SHA256

      040d49edffbebd146fa2fe2014b320dfc737de2c3a0356661c0d3b9d65dd755c

    • SHA512

      8fa359fa5b2f7ee56d40439f8b3072268b18a2c9ec12cd80ff1fbe146554340cd18c5273cac07a0b91e2dae2ecb7ffa2fa708aa2bfb65f41fd0b2e28b17b50a2

    • SSDEEP

      24576:FySXne/EexeN5n99VgZSHrjBr2spIWeynBPHvNg0G/ftHWdSLa:gSXe/Eecr7DjBrVInyBflS2dSL

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks