General
-
Target
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe
-
Size
596KB
-
Sample
250104-rrw9tatjdw
-
MD5
74ea3fe876df4812df04805cb921edb0
-
SHA1
43ba407cf7cb376fbc9932eb6b3142a3d606bdeb
-
SHA256
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952
-
SHA512
f3b26517d67c0843b1ef57a7059d11b51bcbefb07ee092946c36722e29cf7d7131473ed6e9ff3a37a1655258e03199b3ceeec3171e67efc29abf3b23c1408b2a
-
SSDEEP
6144:Zs9C0eaieHm71o2pL2IMJDoMc2ZNu5GQpsnp/yFPMsXnQODVNIg+cTtgJ7AOyZja:Zs9C0eaieHmO292D3//yFPMsXkJ7MmkE
Behavioral task
behavioral1
Sample
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
amadey
5.10
5f729a
http://185.196.8.37
-
install_dir
3660607b8b
-
install_file
Gxtuum.exe
-
strings_key
06cc94bf30d17b3ad1e50d5d826b2788
-
url_paths
/Gd85kkjf/index.php
Targets
-
-
Target
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952N.exe
-
Size
596KB
-
MD5
74ea3fe876df4812df04805cb921edb0
-
SHA1
43ba407cf7cb376fbc9932eb6b3142a3d606bdeb
-
SHA256
517422af0bb3ad483144aaf489017311678f4af7cec58f5dafe68a0db9bd5952
-
SHA512
f3b26517d67c0843b1ef57a7059d11b51bcbefb07ee092946c36722e29cf7d7131473ed6e9ff3a37a1655258e03199b3ceeec3171e67efc29abf3b23c1408b2a
-
SSDEEP
6144:Zs9C0eaieHm71o2pL2IMJDoMc2ZNu5GQpsnp/yFPMsXnQODVNIg+cTtgJ7AOyZja:Zs9C0eaieHmO292D3//yFPMsXkJ7MmkE
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1