General

  • Target

    e84d471a80ec83eb8af3c140a6e4226b.exe

  • Size

    10KB

  • Sample

    231104-ehxsrscc7x

  • MD5

    e84d471a80ec83eb8af3c140a6e4226b

  • SHA1

    0fa7ab7b987a21968e212fc6880a8a9221ea183c

  • SHA256

    cb17971c69696d81a364f55879b02caae2bd0135d0d1d6bfba48868f7a2f1d30

  • SHA512

    671afbdc9d7e5999a5dbc80436e74003282f2d1ca75bc6506c7b6c32bec0c9cd8e923e4641a3c4e43b1f406c50fd7adbf8ec56b7ebbad379618f4310da472b0a

  • SSDEEP

    96:L5u1RonGBS0ivS1dbbDsYn6jMX9ps24tEkKa704yUtGSCOSWWC7pEm0/tfulFYzj:lu1dSebnsoqMXbsfHXyU5WC7pcWF6

Malware Config

Targets

    • Target

      e84d471a80ec83eb8af3c140a6e4226b.exe

    • Size

      10KB

    • MD5

      e84d471a80ec83eb8af3c140a6e4226b

    • SHA1

      0fa7ab7b987a21968e212fc6880a8a9221ea183c

    • SHA256

      cb17971c69696d81a364f55879b02caae2bd0135d0d1d6bfba48868f7a2f1d30

    • SHA512

      671afbdc9d7e5999a5dbc80436e74003282f2d1ca75bc6506c7b6c32bec0c9cd8e923e4641a3c4e43b1f406c50fd7adbf8ec56b7ebbad379618f4310da472b0a

    • SSDEEP

      96:L5u1RonGBS0ivS1dbbDsYn6jMX9ps24tEkKa704yUtGSCOSWWC7pEm0/tfulFYzj:lu1dSebnsoqMXbsfHXyU5WC7pcWF6

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks