Overview
overview
10Static
static
100468127a19...1f.exe
windows7-x64
30468127a19...1f.exe
windows10-2004-x64
32a3b92f618...6b.exe
windows7-x64
102a3b92f618...6b.exe
windows10-2004-x64
10b154ac015c...cf.exe
windows7-x64
8b154ac015c...cf.exe
windows10-2004-x64
8b96bd6bbf0...69.exe
windows7-x64
10b96bd6bbf0...69.exe
windows10-2004-x64
10bb8e52face...3e.dll
windows7-x64
8bb8e52face...3e.dll
windows10-2004-x64
8ca467e3323...a4.dll
windows7-x64
8ca467e3323...a4.dll
windows10-2004-x64
10e93d6f4ce3...ad.exe
windows7-x64
10e93d6f4ce3...ad.exe
windows10-2004-x64
10fa5390bbcc...f6.exe
windows7-x64
10fa5390bbcc...f6.exe
windows10-2004-x64
10General
-
Target
All.ElectroRAT.zip
-
Size
881KB
-
Sample
240913-r39z2svckg
-
MD5
7ff8d31ad43f62f1c6876b725a1ebb1f
-
SHA1
e23baf502bf5b2eb81fea0a2e570e7ade8998bee
-
SHA256
dda14413450a11f336a8305cf274943d614905c3429d4f0efeffe6bf4b8b7bdc
-
SHA512
b1afbd5ed92933ffa1a1add1b5b8cc581c7361d8106fed20a8aee1493af7a0279b27e4220515d39e4f5640df43309aa40073750f9e232438cc5f7a561273a9c6
-
SSDEEP
12288:yykcN4NEaT6082MQxzgoOnAlUiQNd83MBBPXyyg1/UgGc3G4af3ENPNBAIhH6oRt:vkckET92MAs8oNvLKBU5l4iCsWvVbGo
Behavioral task
behavioral1
Sample
0468127a19daf4c7bc41015c5640fe1f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0468127a19daf4c7bc41015c5640fe1f.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
2a3b92f6180367306d750e59c9b6446b.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2a3b92f6180367306d750e59c9b6446b.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
b154ac015c0d1d6250032f63c749f9cf.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
b154ac015c0d1d6250032f63c749f9cf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
b96bd6bbf0e3f4f98b606a2ab5db4a69.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
b96bd6bbf0e3f4f98b606a2ab5db4a69.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
bb8e52face5b076cc890bbfaaf4bb73e.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
bb8e52face5b076cc890bbfaaf4bb73e.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ca467e332368cbae652245faa4978aa4.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ca467e332368cbae652245faa4978aa4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
e93d6f4ce34d4f594d7aed76cfde0fad.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
e93d6f4ce34d4f594d7aed76cfde0fad.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
fa5390bbcc4ab768dd81f31eac0950f6.exe
Resource
win7-20240729-en
Malware Config
Extracted
amadey
2.03
044a28
-
install_dir
3101f8f780
-
install_file
gbudn.exe
-
strings_key
98efc0765f4c223e79368db4c8650353
-
url_paths
/hfv23svj2/index.php
Targets
-
-
Target
0468127a19daf4c7bc41015c5640fe1f
-
Size
121KB
-
MD5
0468127a19daf4c7bc41015c5640fe1f
-
SHA1
133877dd043578a2e9cbe1a4bf60259894288afa
-
SHA256
dd1792bcdf560ebaa633f72de4037e78fe1ada5c8694b9d4879554aedc323ac9
-
SHA512
39cec4cdc9e2b02923513a3f1bc3ac086b0598df77c7029493a810dfbe40c946fa62905d1dcb80aba87c9e74677aac893108faa94e027c261aff7d388bbdcdfc
-
SSDEEP
3072:5HYBf8YzKw/MHfBTU3eiu0B/qIbmuvFT8whrQnFW:5HY70Bou0B/q6IOrQnFW
Score3/10 -
-
-
Target
2a3b92f6180367306d750e59c9b6446b
-
Size
178KB
-
MD5
2a3b92f6180367306d750e59c9b6446b
-
SHA1
95fb90137086c731b84db0a1ce3f0d74d6931534
-
SHA256
18fd6b193be1d5416a3188f5d9e4047cca719fa067d7d0169cf2df5c7fed54c0
-
SHA512
c87cda81a0133db40be68e0dd94e39f986f3a32faa54d4a1420e071407c94fffdfef6d6ec8f3fdb893115d84ae12824436cf5785fdb2c77dafb96be858b3b5d0
-
SSDEEP
3072:GK0YqBB9mUQ13o2vM2tD81JI0MBkuomh87I3pBSpvVFLm:GnrB9mUWdk26DIquom2dN
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
b154ac015c0d1d6250032f63c749f9cf
-
Size
457KB
-
MD5
b154ac015c0d1d6250032f63c749f9cf
-
SHA1
c96eab62367bd9efb5e124621d8dc2be7c5a61be
-
SHA256
f33c78cddcf99dd999b065644a17dcbac1b222a7f3342b3fe3293ddb6ecf0060
-
SHA512
dec37485f6e9e9109fa954d5e024223f555af7c2b12f5c9855aa77b43e97d5e54f4cdc651331eee2c7fcaf0a3fa58bb41222cdb3ce16c84b444ef564e7ce6eeb
-
SSDEEP
12288:vw4bw/3KjP7bHnREf60JDQJ1MFrhi9PFBVoI+kA3dz+YsM9jMw9pMQH/Nxct+fbN:I4bw/3KjP7bHnREf60JDQJ1MFrhi9PFE
Score8/10-
Modifies RDP port number used by Windows
-
-
-
Target
b96bd6bbf0e3f4f98b606a2ab5db4a69
-
Size
330KB
-
MD5
b96bd6bbf0e3f4f98b606a2ab5db4a69
-
SHA1
b1d370efd0accfc0850237d9d54b19c5c1bf071d
-
SHA256
2f83e130e52cb13944899e81f4ecf49decf52e3949f6d41b45e8b1a19a658ed6
-
SHA512
b15e3928fdce6193233c9bf06d979ba5c707144c68abd7a25b976f581f33eaca903f44f564d2d05481915d050e74385196cc61629b8bc5be393ae4c89acd6525
-
SSDEEP
6144:PEFgPWJh7yd23476SjW2h6al/k5MyF/zq2aqo:sFVJqoQk5FFrWL
-
KPOT Core Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
-
-
Target
bb8e52face5b076cc890bbfaaf4bb73e
-
Size
222KB
-
MD5
bb8e52face5b076cc890bbfaaf4bb73e
-
SHA1
df430358a2c7eaf3e328a00a6f961ded9428e491
-
SHA256
5545f31c832c8bde6cf7563cdc0f4a4b9b15416480e14f15420b1691444c376d
-
SHA512
f465c12bf336e659608c3a4f1e8e14b0876d28f0ad1a75ffb60c674da9a3535493a7e9357ef6b55f78666418ef9c4f7795aa2840aac0f41d6b53131e353b1a59
-
SSDEEP
6144:qJ+WK/pvT7arfwKFzDTsv5oaTh45CjBscX9TEGgO:RJpb7Y7vf5i5X9TcO
Score8/10-
Blocklisted process makes network request
-
-
-
Target
ca467e332368cbae652245faa4978aa4
-
Size
124KB
-
MD5
ca467e332368cbae652245faa4978aa4
-
SHA1
b6477944050fb4014c747c793378792b268ac06b
-
SHA256
279524f17f8dd8753f57c2e3e91d21ad84db10316dfbf925cc19556cef55b99d
-
SHA512
ce514859dd29aab68cc10acf7b2571a4f505b4ae4028f2bb9f733078d1eef6856581df42aa854861d8e7a8c61b01b9c67fd1f5774dd0c388a4ae960530d7f3af
-
SSDEEP
3072:OeZmogDk+MPedGpqpm2pSBwkXWEfIvgNL2oA29:OeZkgXPppvhfvNS
-
Blocklisted process makes network request
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
-
-
Target
e93d6f4ce34d4f594d7aed76cfde0fad
-
Size
1024KB
-
MD5
e93d6f4ce34d4f594d7aed76cfde0fad
-
SHA1
786273ccee50c19e5d6f92aac58dbf617c79ec06
-
SHA256
adeba13b358ea8be691fd7f4d025a6ea27b9b120d97d312ea875d6067434d77e
-
SHA512
f4ed1270e447fe7406f33a0f1580f4789a799e1f1bfbd8303f2e93d7868dc40b9971f13f88513e48340fa90c91cb86d56d998e0d9cfda65ba150add638ebf0c7
-
SSDEEP
1536:WVieJrIbvUMqCgBKrLDd0GqlMm2+Na4NMRJMZkWKaH6kY+1WrwHNzx7hb3xMc:kie1AUztxKaakY+ksHNl3Mc
-
KPOT Core Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
-
-
Target
fa5390bbcc4ab768dd81f31eac0950f6
-
Size
598KB
-
MD5
fa5390bbcc4ab768dd81f31eac0950f6
-
SHA1
c7d6151d7831d8b75ae6760c3006de58ae2d05e5
-
SHA256
587a4463673093554cd75b5c9ccb6c254a9d6e8769b1e45ea0390eb2b9d57bff
-
SHA512
867ddbba9144685aafaf90e8dc1b30ea47c8e9bb7eb1b57d8902d15e6cd632f85437e92371bf5f601a00bdf976b4c90739b027ebb48d2a9f8da8b174d618022e
-
SSDEEP
6144:HHY70Bou0B/q6IwThbCgcGA/siicMSwbSxwepXJRHCQn:H47Bu0B/LIUzBMKQn
-
KPOT Core Executable
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1