General

  • Target

    5554595940945dc2e7549d8840344e150954f6419b0e809e1bcfb667fcd663f3

  • Size

    126KB

  • Sample

    240319-xnfesada61

  • MD5

    2930d1a61c3e082b983802bf71266ec0

  • SHA1

    9b676931a59da39eac50a08c15d5c4beb22ac366

  • SHA256

    5554595940945dc2e7549d8840344e150954f6419b0e809e1bcfb667fcd663f3

  • SHA512

    df8038ac7866a9929d56f138380ec75b78723a5a99ce425f394b216f8a30597a90e6f1173269dda06b3a414b0ccab60a6cf1fef2d0047f5ed010d5c7f9aed53b

  • SSDEEP

    3072:Yx7p5EJTJx+Rg/TwY1o9CeQepHOSNGwbQ6kUzlCN9V0869:Yx781URg/eCeZfIUzlC

Malware Config

Targets

    • Target

      5554595940945dc2e7549d8840344e150954f6419b0e809e1bcfb667fcd663f3

    • Size

      126KB

    • MD5

      2930d1a61c3e082b983802bf71266ec0

    • SHA1

      9b676931a59da39eac50a08c15d5c4beb22ac366

    • SHA256

      5554595940945dc2e7549d8840344e150954f6419b0e809e1bcfb667fcd663f3

    • SHA512

      df8038ac7866a9929d56f138380ec75b78723a5a99ce425f394b216f8a30597a90e6f1173269dda06b3a414b0ccab60a6cf1fef2d0047f5ed010d5c7f9aed53b

    • SSDEEP

      3072:Yx7p5EJTJx+Rg/TwY1o9CeQepHOSNGwbQ6kUzlCN9V0869:Yx781URg/eCeZfIUzlC

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Detect Amadey credential stealer module

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

1
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks