General

  • Target

    e0fa46dcdfa93a3769a567a1498742d7.exe

  • Size

    1.2MB

  • Sample

    241031-1bawbavphl

  • MD5

    e0fa46dcdfa93a3769a567a1498742d7

  • SHA1

    ee175a77cd109dd569630f70191a3f99205f6b51

  • SHA256

    4078918043613a0ca03b117d29263f67a09477e6bab9d624453051d702065eb4

  • SHA512

    9596c6d645839e3cf5f8edadbcfcb8102e40de6acd3f77d0e72eb15bcd727444a601a7e31eb17bc2bf61a8b35d29666bc58e2083258bb136c105aa2867b20e97

  • SSDEEP

    24576:Bjd+7fzBMqZjh2sntUcCy8LfunZzW8IFHcDVh1HhHAO:BABHjh2OZ80ZzHIF85D

Malware Config

Extracted

Family

amadey

Version

5.03

Botnet

c15c21

C2

http://45.93.20.135

Attributes
  • strings_key

    5f9278bece2d0777966f092ec032e601

  • url_paths

    /5nDshOg3cwA/index.php

rc4.plain

Targets

    • Target

      e0fa46dcdfa93a3769a567a1498742d7.exe

    • Size

      1.2MB

    • MD5

      e0fa46dcdfa93a3769a567a1498742d7

    • SHA1

      ee175a77cd109dd569630f70191a3f99205f6b51

    • SHA256

      4078918043613a0ca03b117d29263f67a09477e6bab9d624453051d702065eb4

    • SHA512

      9596c6d645839e3cf5f8edadbcfcb8102e40de6acd3f77d0e72eb15bcd727444a601a7e31eb17bc2bf61a8b35d29666bc58e2083258bb136c105aa2867b20e97

    • SSDEEP

      24576:Bjd+7fzBMqZjh2sntUcCy8LfunZzW8IFHcDVh1HhHAO:BABHjh2OZ80ZzHIF85D

    • Blocklisted process makes network request

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks