General
-
Target
fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648
-
Size
1.0MB
-
Sample
230421-jr19rseg24
-
MD5
61277d28735d9a1d2e1c6a576374fbcf
-
SHA1
20a833f2213165ccc1cb85cba18a52878994121a
-
SHA256
fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648
-
SHA512
91f154a0fa5883d1ec9c961f84c77ffb2ef7c46eb0a3b8001e12b82aafa869445b4a583bcc540336e22def0f7f83bada2035c8c5c038dfbd18a35fba459a39b2
-
SSDEEP
24576:EyaSvu86QBc1I8L6Y9PtDzvOfpp3vsrefMl4w531mliN:TxJ/c1IUtfvOfpZUrX4w1
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648
-
Size
1.0MB
-
MD5
61277d28735d9a1d2e1c6a576374fbcf
-
SHA1
20a833f2213165ccc1cb85cba18a52878994121a
-
SHA256
fa01bc1b6fa30d146387065fc27fe6231713b23d9c4d962ac5c9ac5ef8d1b648
-
SHA512
91f154a0fa5883d1ec9c961f84c77ffb2ef7c46eb0a3b8001e12b82aafa869445b4a583bcc540336e22def0f7f83bada2035c8c5c038dfbd18a35fba459a39b2
-
SSDEEP
24576:EyaSvu86QBc1I8L6Y9PtDzvOfpp3vsrefMl4w531mliN:TxJ/c1IUtfvOfpZUrX4w1
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-