Resubmissions
06/04/2025, 12:48
250406-p11mgs1my2 506/04/2025, 11:12
250406-naz3lazjt2 1006/04/2025, 11:10
250406-m9sbcsyr15 506/04/2025, 10:54
250406-mzvnqswyat 1006/04/2025, 10:45
250406-mtjpaaypz4 1006/04/2025, 10:41
250406-mq7xpsypy4 1006/04/2025, 10:38
250406-mpjtgsypx8 1006/04/2025, 10:26
250406-mgmv6syps3 1006/04/2025, 10:19
250406-mcrcssyny6 1006/04/2025, 10:07
250406-l5tg7awvdv 10General
-
Target
AutoClicker-3.1.exe
-
Size
860KB
-
Sample
250406-mgmv6syps3
-
MD5
c208a15591828ac1b1c825f33fd55c8a
-
SHA1
bea4a247ece1a749d0994fc085fbd2d7c90a21e7
-
SHA256
a6ee6130d83bbe55e9dacdff2005950d69fc2d3c54e28467b82c148e274d90da
-
SHA512
b78d8055fc64bac1cdd366cdb339df2e081228bd998fdb5450a6832b0720c1b321568aabd7535ce62c16067ad20c86e51712c3e78bc40945adc05c63565fd889
-
SSDEEP
12288:2aWzgMg7v3qnCipErQohh0F4xCJ8lnydQEzFGZ3dRP6yWD:RaHMv6C1rjpnydQEOPdWD
Static task
static1
Behavioral task
behavioral1
Sample
AutoClicker-3.1.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.alizametal.com.tr - Port:
21 - Username:
alizametal.com.tr - Password:
hd611
Extracted
amadey
2.41
19fd77
http://900ama.com
http://ama529.ru
http://amaad100.com
-
install_dir
152c6d54a1
-
install_file
rgbux.exe
-
strings_key
9743856140ac2556625071f397db8bdc
-
url_paths
/gBcskbwWs/index.php
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.faks-allied-health.com - Port:
587 - Username:
[email protected] - Password:
$Faks1234 - Email To:
[email protected]
Targets
-
-
Target
AutoClicker-3.1.exe
-
Size
860KB
-
MD5
c208a15591828ac1b1c825f33fd55c8a
-
SHA1
bea4a247ece1a749d0994fc085fbd2d7c90a21e7
-
SHA256
a6ee6130d83bbe55e9dacdff2005950d69fc2d3c54e28467b82c148e274d90da
-
SHA512
b78d8055fc64bac1cdd366cdb339df2e081228bd998fdb5450a6832b0720c1b321568aabd7535ce62c16067ad20c86e51712c3e78bc40945adc05c63565fd889
-
SSDEEP
12288:2aWzgMg7v3qnCipErQohh0F4xCJ8lnydQEzFGZ3dRP6yWD:RaHMv6C1rjpnydQEOPdWD
-
Amadey family
-
Gh0st RAT payload
-
Gh0strat family
-
Modifies firewall policy service
-
Snake Keylogger payload
-
Snakekeylogger family
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1