General

  • Target

    7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.zip

  • Size

    290KB

  • Sample

    231119-3gvh1sdd5w

  • MD5

    35a900ccd7bdcf4218972c1544af8261

  • SHA1

    b09722b239048ac87e70dda2e966b78a7bf8887b

  • SHA256

    3beed64680b0f4380849b8db370f221e349f02a89b8f4d20471bd967e2cfcd2f

  • SHA512

    6dff64230324a515885e35efcaf145b69341d2ea1155b56ddd91734524df48fa05490f575f202488a526c5053a1d8220b93ee4c7df9a80bd280dfc1193197203

  • SSDEEP

    6144:NSlxJwaMg1lNAFCY/Vbnyws/UpFlcBKIq0isTyO91:wiaMg1wYY/VrywGwYKIq0isTz91

Malware Config

Targets

    • Target

      7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe

    • Size

      371KB

    • MD5

      39031b603dfec9cb262b06b023e75162

    • SHA1

      ea4becf8795bfc19444e01f5ee05f96505650f83

    • SHA256

      7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3

    • SHA512

      b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95

    • SSDEEP

      6144:0LulNUMh/jih8MugQ6uFG6nqqCBvnVOY+XJ5ezwv3gCEpOtlpD96q:0alNUMhGhDuJLnqqC1VH+Z5ezwfgCEpu

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks