General

  • Target

    2025-07-01_755eb5ec7dfaa874cbd0b8399dc1a631_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop

  • Size

    5.7MB

  • Sample

    250701-jznnms11ht

  • MD5

    755eb5ec7dfaa874cbd0b8399dc1a631

  • SHA1

    93a49f3d6f8f9fdbf772128528e298264fde3c79

  • SHA256

    b2e630b1098ed7ecc6e4bf43695ff84f9963595c6382c808e29cbeecae1985b9

  • SHA512

    8b876db085943df393c32c8971db72e496a4e67c414e500c4c70239fe295a0e190ce041fed56839de5f23637e857931e9bf819820f45bc9e6b03d695c1ca5557

  • SSDEEP

    98304:OTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdA/j9Tz5C:4Y4sBI0IZFC/jF5C

Malware Config

Targets

    • Target

      2025-07-01_755eb5ec7dfaa874cbd0b8399dc1a631_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop

    • Size

      5.7MB

    • MD5

      755eb5ec7dfaa874cbd0b8399dc1a631

    • SHA1

      93a49f3d6f8f9fdbf772128528e298264fde3c79

    • SHA256

      b2e630b1098ed7ecc6e4bf43695ff84f9963595c6382c808e29cbeecae1985b9

    • SHA512

      8b876db085943df393c32c8971db72e496a4e67c414e500c4c70239fe295a0e190ce041fed56839de5f23637e857931e9bf819820f45bc9e6b03d695c1ca5557

    • SSDEEP

      98304:OTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdA/j9Tz5C:4Y4sBI0IZFC/jF5C

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks