General

  • Target

    244584512d6decb0d37cef150886e636.bin

  • Size

    16KB

  • Sample

    230519-bgptzsdc3x

  • MD5

    186d8c94d149574df383a70420fee42a

  • SHA1

    317087a4ab158eba4b851349fef33adcb45f46a8

  • SHA256

    363156046460344c5dc499b0aa0e32078aabb3f1fe6229bc056cb7497948416d

  • SHA512

    6f3397dd124a538ddf2971df541e8864c9fe691a324e6574aa8b8a653fe5935b7e9a6fcd00791c133cb5b35c22e37ecee58437a2d3309372f2be423d2f5505c6

  • SSDEEP

    384:Djly9POrbn6ZqJve7SnUagb0KqAIUJ7yKT778g7oOFnqb:FaPOrbn1ULagbrQmb778Eqb

Malware Config

Targets

    • Target

      56107979d024223bd4ba443cf654ebfc32e19a3eaffd7a055fadb6ac1ce97866.bat

    • Size

      22KB

    • MD5

      244584512d6decb0d37cef150886e636

    • SHA1

      fe50c7e039605957ab9bfd034f7861e6023d0093

    • SHA256

      56107979d024223bd4ba443cf654ebfc32e19a3eaffd7a055fadb6ac1ce97866

    • SHA512

      24613bbe96ab7befac49f8d4acd6b8a9d14bb0add1651412c0859d4031feabd2aa40e8e582a449af7acbb0eba6776de1b65f0ead759c7fcf089bf3d12eb46243

    • SSDEEP

      384:b2VPeJS3xtpEG3cZrUKUE0gMGfa9720wvjeqzAzW6yeVf9jlP7JYK5zf8rh:bUWJS3xwQ8rUwMaaJ20wvjj0zLVRlzO5

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • UAC bypass

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks