General

  • Target

    7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.zip

  • Size

    290KB

  • Sample

    231119-zh473acc2s

  • MD5

    13ab4534856b9dabc29c768fc40e4085

  • SHA1

    12557d79959b1b6c7f0776c5c311a350bf9a4bb7

  • SHA256

    5db85ac14dd58756e73bed0479de6503adcccd5aef56e82d3c8572233e14d7bc

  • SHA512

    78e8c552f67f2fe9551de47620be48fd5a044e33396e02a5c85e5e9247a104bb1515223486068d941504cf5d75ca997c251c706bf86c01b776d079186e275017

  • SSDEEP

    6144:gQkdvoEtMc0g5J3+6577O72RRZMO7pJQHJH6qKcfjgbe:d+voEtKI3+YjtLQHJaqzfjg6

Malware Config

Targets

    • Target

      7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3.exe

    • Size

      371KB

    • MD5

      39031b603dfec9cb262b06b023e75162

    • SHA1

      ea4becf8795bfc19444e01f5ee05f96505650f83

    • SHA256

      7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3

    • SHA512

      b3006993fdd5f6b0f56cf583a18ce5e1a1369ae68b613b571db08225a5a1000c28d6d14a094e87cda3d1aeab695caed4d775e1d06c390be8fc975d1159e1cc95

    • SSDEEP

      6144:0LulNUMh/jih8MugQ6uFG6nqqCBvnVOY+XJ5ezwv3gCEpOtlpD96q:0alNUMhGhDuJLnqqC1VH+Z5ezwfgCEpu

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks