General

  • Target

    7c0d30d2ee3f154e63c58ffbf2bed2073739af47b7b9177ceb19c9b3841f0c72

  • Size

    952KB

  • Sample

    230418-m8ec4scg5w

  • MD5

    483dafae885f2b60765688d9fa441e6d

  • SHA1

    0d699da6b5e128e8ba732fe8195569d3e82c5fbe

  • SHA256

    7c0d30d2ee3f154e63c58ffbf2bed2073739af47b7b9177ceb19c9b3841f0c72

  • SHA512

    e59d6ad78f49cdc2387d00353e3bd489b95d57aec8efb99b4a9630e8d046d95108f0449e9ecdda6c50ef0b92650be7943762acfb58c97c572d4553cb69991785

  • SSDEEP

    12288:sy900UuEu1FbQi2xKIa5bIBGeisImyaExKMFsPb5zALcHtvdgm/VNOI1I4mY+C6r:sy9tHBvzxTsJyaI1FiGLKtvyG+rEw

Malware Config

Targets

    • Target

      7c0d30d2ee3f154e63c58ffbf2bed2073739af47b7b9177ceb19c9b3841f0c72

    • Size

      952KB

    • MD5

      483dafae885f2b60765688d9fa441e6d

    • SHA1

      0d699da6b5e128e8ba732fe8195569d3e82c5fbe

    • SHA256

      7c0d30d2ee3f154e63c58ffbf2bed2073739af47b7b9177ceb19c9b3841f0c72

    • SHA512

      e59d6ad78f49cdc2387d00353e3bd489b95d57aec8efb99b4a9630e8d046d95108f0449e9ecdda6c50ef0b92650be7943762acfb58c97c572d4553cb69991785

    • SSDEEP

      12288:sy900UuEu1FbQi2xKIa5bIBGeisImyaExKMFsPb5zALcHtvdgm/VNOI1I4mY+C6r:sy9tHBvzxTsJyaI1FiGLKtvyG+rEw

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks