General

  • Target

    4ff550dfe495cf12490ccfc585a9a4a1ba0f0b2ec7e9f2f3995920e6eb77262c

  • Size

    959KB

  • Sample

    230421-pmzs2ahc91

  • MD5

    becbfc48877d9c8ca9de446d29f00b61

  • SHA1

    af22e2008f444fad3e93d2c6f5826ecdaa9147b0

  • SHA256

    4ff550dfe495cf12490ccfc585a9a4a1ba0f0b2ec7e9f2f3995920e6eb77262c

  • SHA512

    c10a65577716e3bb7d404355fac0fc2babfc28648de944b9ed316bcddc6e3bc1b34fac5aee1bbf34294846f14d440dad1de8edd4f10424867c8a9bbb7743722b

  • SSDEEP

    12288:4y90DQEv8UHwlXNPBawinPD8FLx/QDGEN9MqB645tgpdqcp6+g6s4QenY9i2ZkY9:4yjELGyr7SQD9NZZXCTgx1eY5RM+ILC

Malware Config

Targets

    • Target

      4ff550dfe495cf12490ccfc585a9a4a1ba0f0b2ec7e9f2f3995920e6eb77262c

    • Size

      959KB

    • MD5

      becbfc48877d9c8ca9de446d29f00b61

    • SHA1

      af22e2008f444fad3e93d2c6f5826ecdaa9147b0

    • SHA256

      4ff550dfe495cf12490ccfc585a9a4a1ba0f0b2ec7e9f2f3995920e6eb77262c

    • SHA512

      c10a65577716e3bb7d404355fac0fc2babfc28648de944b9ed316bcddc6e3bc1b34fac5aee1bbf34294846f14d440dad1de8edd4f10424867c8a9bbb7743722b

    • SSDEEP

      12288:4y90DQEv8UHwlXNPBawinPD8FLx/QDGEN9MqB645tgpdqcp6+g6s4QenY9i2ZkY9:4yjELGyr7SQD9NZZXCTgx1eY5RM+ILC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks