General

  • Target

    c3f6354c94ae880d0254f356f2836aaf4aec81b903e4054f75f6e517183e9fce.zip

  • Size

    293KB

  • Sample

    231119-3vbytscg56

  • MD5

    a321d29e692f6cae3a724e540cdd1025

  • SHA1

    e2335e4bd81d0407a1a3f9bab9a4817be23e0a89

  • SHA256

    0a79ae6a925ed44ddfdd43a5b152ef882b9733e7fa0546e9129783a421618ebc

  • SHA512

    b7086a3a9e034bf653f11fd3ccd766176a431b9e3d946549ad30c66ab72f680ec3ba3cabaf7c326afa146730234fd228c05519a8c72489987ba8b042ab9c8968

  • SSDEEP

    6144:sa18Xr1rLK+JvKB3wS81rcoOZi0Ps6EaQtYezXx1le67Z:eXBrLKFVDoOZi0PsHaQ9zXvVZ

Malware Config

Targets

    • Target

      c3f6354c94ae880d0254f356f2836aaf4aec81b903e4054f75f6e517183e9fce.exe

    • Size

      393KB

    • MD5

      06e2d86298746110ea703acc31c66323

    • SHA1

      b341bb06c3196103723f44a95f0b0afcb86ce1ce

    • SHA256

      c3f6354c94ae880d0254f356f2836aaf4aec81b903e4054f75f6e517183e9fce

    • SHA512

      e1452002d3a92b0c56da22a2a88e54f4fc33dce34e494f8efbd239e0b0606486d74b0d20927d1d6997437bd48e5cf03eb57afc7d4302e67e412c600a2fe7605b

    • SSDEEP

      6144:JILhVvboBJDl5mUPknVDzRbIoXMGx8DSPm1bCHU75M9X2l:yNJYl9knBSoJvPm1m0d5

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks