General

  • Target

    Stealing.zip

  • Size

    8.7MB

  • MD5

    eb6c6b693da8f48f0e8a4aebf4f656a1

  • SHA1

    f76d4fd8b683655621f7ed8dabcecae5d173af83

  • SHA256

    f59a76db9125655f52f2984e913c74a248ed514244b1641bde6097c6eda88088

  • SHA512

    8b6ad4a0744e3c1e5b84467fe46d1178bf08f707563454eb64fe0939fa6272efc1b94ecfb3b9ecec88f7370d30cb34ec1c039bd8a57f6538c0ee1c0c1e25ed9c

  • SSDEEP

    196608:Ff/CY3JvH09m3JvH09UpLui45krwP0xnmVi5t7mIlUnl0mNZAxp:Ff/1vlLu55MdnmU5Py+r

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.12

Botnet

037208

C2

http://185.172.128.19

Attributes
  • install_dir

    cd1f156d67

  • install_file

    Utsysc.exe

  • strings_key

    0dd3e5ee91b367c60c9e575983554b30

  • url_paths

    /ghsdh39s/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 7 IoCs

    Checks for missing Authenticode signature.

Files

  • Stealing.zip
    .zip
  • 5.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • Newoff.exe
    .exe windows:6 windows x86 arch:x86

    d0db1addc5d20c6bf2731d82832030a0


    Headers

    Imports

    Sections

  • cock (1).exe
    .exe windows:6 windows x86 arch:x86

    4e56c5a0933590e2f4c1321a628109f2


    Headers

    Imports

    Sections

  • cock.exe
    .exe windows:6 windows x86 arch:x86

    4e56c5a0933590e2f4c1321a628109f2


    Headers

    Imports

    Sections

  • file300un.exe
    .exe windows:4 windows x64 arch:x64


    Code Sign

    Headers

    Sections

  • random (1).exe
    .exe windows:6 windows x86 arch:x86

    2eabe9054cad5152567f0699947a2c5b


    Headers

    Imports

    Sections

  • random.exe
    .exe windows:6 windows x86 arch:x86

    2eabe9054cad5152567f0699947a2c5b


    Headers

    Imports

    Sections

  • sarra.exe
    .exe windows:6 windows x86 arch:x86

    2eabe9054cad5152567f0699947a2c5b


    Headers

    Imports

    Sections