General

  • Target

    2025-06-30_b2537fc91ce5c0c108c58695607ea00b_amadey_elex_smoke-loader_stop

  • Size

    5.4MB

  • Sample

    250630-vln8sshp4w

  • MD5

    b2537fc91ce5c0c108c58695607ea00b

  • SHA1

    6122032031d70407622b45c99061d5f550ebd6c3

  • SHA256

    3510f63079c1637cdd95a4f882f1d10404a06ffbbb75ead452274cd1529c1d4b

  • SHA512

    5d1a601fb6f6d0d988824f63ad9fffc74c57675fe5ab7867c7ccf0763f30f5840ea4c5c0ae9554f7bd1f8f5a0c8781274a620acd4b0a4d1c364858e6519a4a8f

  • SSDEEP

    98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLx:0jJz

Malware Config

Targets

    • Target

      2025-06-30_b2537fc91ce5c0c108c58695607ea00b_amadey_elex_smoke-loader_stop

    • Size

      5.4MB

    • MD5

      b2537fc91ce5c0c108c58695607ea00b

    • SHA1

      6122032031d70407622b45c99061d5f550ebd6c3

    • SHA256

      3510f63079c1637cdd95a4f882f1d10404a06ffbbb75ead452274cd1529c1d4b

    • SHA512

      5d1a601fb6f6d0d988824f63ad9fffc74c57675fe5ab7867c7ccf0763f30f5840ea4c5c0ae9554f7bd1f8f5a0c8781274a620acd4b0a4d1c364858e6519a4a8f

    • SSDEEP

      98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLx:0jJz

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks