General

  • Target

    c733f5a17cdae510b743f64bb8cf0dc6ea6e4f8083c784cd92a1f4c978b4315c

  • Size

    808KB

  • Sample

    230421-tpbansaf6z

  • MD5

    223ba80d73e52ca2e1c22f91362e5460

  • SHA1

    46352c7df3b38f06d06a0d9c0d7e24f0e6a28b71

  • SHA256

    c733f5a17cdae510b743f64bb8cf0dc6ea6e4f8083c784cd92a1f4c978b4315c

  • SHA512

    f32e418b4e5a158aed2eb26b651d1ed8e560321cb207d7742b24345deb0ff24fae4b0bc920aa7a3d6c2fafca732cf72abd6b279c7681b0e67ecb84e8b357bbc3

  • SSDEEP

    12288:By90PjaJQHpwhg8rI9W5OZSFVwE8AJDa6b1jXrhslrrBU:Bywagwh/rI9OTVRLae1jXFG3BU

Malware Config

Targets

    • Target

      c733f5a17cdae510b743f64bb8cf0dc6ea6e4f8083c784cd92a1f4c978b4315c

    • Size

      808KB

    • MD5

      223ba80d73e52ca2e1c22f91362e5460

    • SHA1

      46352c7df3b38f06d06a0d9c0d7e24f0e6a28b71

    • SHA256

      c733f5a17cdae510b743f64bb8cf0dc6ea6e4f8083c784cd92a1f4c978b4315c

    • SHA512

      f32e418b4e5a158aed2eb26b651d1ed8e560321cb207d7742b24345deb0ff24fae4b0bc920aa7a3d6c2fafca732cf72abd6b279c7681b0e67ecb84e8b357bbc3

    • SSDEEP

      12288:By90PjaJQHpwhg8rI9W5OZSFVwE8AJDa6b1jXrhslrrBU:Bywagwh/rI9OTVRLae1jXFG3BU

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks