General

  • Target

    50f7ce2d71c6973479a0c2cccf6f76ad1762e8a399e8c57f985a269f077c6433

  • Size

    820KB

  • Sample

    230421-y8lmzahg54

  • MD5

    afd14903f6dae8a1626a46678621ccf6

  • SHA1

    6da9d5016618e843bd7bf47453fd10b386b87014

  • SHA256

    50f7ce2d71c6973479a0c2cccf6f76ad1762e8a399e8c57f985a269f077c6433

  • SHA512

    3eb081e51412989d46b41bd7394783edc342692e1ab0d63ccea1f8b8754701acb18f6cd840a7e49f2d48ef4b876109400a6f16d5fa3028a8bcb8075a0aeb84c8

  • SSDEEP

    12288:cy90YJdOZl8OqG5oJh9RISu4yYaYHGDe7YixTBjUM5Cg5bIA+e7drNMfAwz7b:cyFOZl8dTG4y/6b92Md57MfAC

Malware Config

Targets

    • Target

      50f7ce2d71c6973479a0c2cccf6f76ad1762e8a399e8c57f985a269f077c6433

    • Size

      820KB

    • MD5

      afd14903f6dae8a1626a46678621ccf6

    • SHA1

      6da9d5016618e843bd7bf47453fd10b386b87014

    • SHA256

      50f7ce2d71c6973479a0c2cccf6f76ad1762e8a399e8c57f985a269f077c6433

    • SHA512

      3eb081e51412989d46b41bd7394783edc342692e1ab0d63ccea1f8b8754701acb18f6cd840a7e49f2d48ef4b876109400a6f16d5fa3028a8bcb8075a0aeb84c8

    • SSDEEP

      12288:cy90YJdOZl8OqG5oJh9RISu4yYaYHGDe7YixTBjUM5Cg5bIA+e7drNMfAwz7b:cyFOZl8dTG4y/6b92Md57MfAC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Modifies Windows Defender Real-time Protection settings

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks