General

  • Target

    cred64.dll.exe

  • Size

    1.2MB

  • Sample

    250128-twydsaxmcl

  • MD5

    f9f252d2dfbb062e1ccc62df48e3b531

  • SHA1

    a3e0035cef91cf65ca9e447e408895993b371c0c

  • SHA256

    6b5df7909e349ce04b4ec2e3b02bd0f3c1f49173d7d1485946e4c4e9194e88ae

  • SHA512

    39f29169b8859edd5ead59ce5478f3044e127177b238d911f77c0cbab75a216dd2ee10c04c350098f9738815854af3fdce11fa675201364e75df0bf691294973

  • SSDEEP

    24576:/O/VvL5QafhQsnoXyaoMferXQ5rnxQBuLv8Y4fSffUO9l:S5nfhQzOMoA5rnxHv8BSUe

Malware Config

Extracted

Family

amadey

Version

5.18

Botnet

c8dbfa

C2

http://92.255.57.155

Attributes
  • strings_key

    4cf32b4269fbd757b3711ecec2c5b9f0

  • url_paths

    /yXNwKVfkS28Y/index.php

rc4.plain

Targets

    • Target

      cred64.dll.exe

    • Size

      1.2MB

    • MD5

      f9f252d2dfbb062e1ccc62df48e3b531

    • SHA1

      a3e0035cef91cf65ca9e447e408895993b371c0c

    • SHA256

      6b5df7909e349ce04b4ec2e3b02bd0f3c1f49173d7d1485946e4c4e9194e88ae

    • SHA512

      39f29169b8859edd5ead59ce5478f3044e127177b238d911f77c0cbab75a216dd2ee10c04c350098f9738815854af3fdce11fa675201364e75df0bf691294973

    • SSDEEP

      24576:/O/VvL5QafhQsnoXyaoMferXQ5rnxQBuLv8Y4fSffUO9l:S5nfhQzOMoA5rnxHv8BSUe

    • Blocklisted process makes network request

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

MITRE ATT&CK Enterprise v15

Tasks