General

  • Target

    NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe

  • Size

    395KB

  • Sample

    231117-tjx79abg7y

  • MD5

    27f3ee84cf6c103db746602bd309b4ae

  • SHA1

    e7e88cff99c7fec0e8661f1066f6503a967e424d

  • SHA256

    6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4

  • SHA512

    bd67b9e9424c6c817c7ff0790139276155b611944243dc57bc526b1577cd195885fc87d792a455fb7a75a755e0c05e29e80739d23834b760b9f40c5db27f3745

  • SSDEEP

    6144:fLhat7FJYk9idwSOr0TLlDtIY6wR+fjSTyHeZ:fts7FJnqZhDtr6wofjSTy

Malware Config

Targets

    • Target

      NEAS.6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4.exe

    • Size

      395KB

    • MD5

      27f3ee84cf6c103db746602bd309b4ae

    • SHA1

      e7e88cff99c7fec0e8661f1066f6503a967e424d

    • SHA256

      6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4

    • SHA512

      bd67b9e9424c6c817c7ff0790139276155b611944243dc57bc526b1577cd195885fc87d792a455fb7a75a755e0c05e29e80739d23834b760b9f40c5db27f3745

    • SSDEEP

      6144:fLhat7FJYk9idwSOr0TLlDtIY6wR+fjSTyHeZ:fts7FJnqZhDtr6wofjSTy

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks