General
-
Target
2025-07-01_755eb5ec7dfaa874cbd0b8399dc1a631_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop
-
Size
5.7MB
-
Sample
250701-jznnms11ht
-
MD5
755eb5ec7dfaa874cbd0b8399dc1a631
-
SHA1
93a49f3d6f8f9fdbf772128528e298264fde3c79
-
SHA256
b2e630b1098ed7ecc6e4bf43695ff84f9963595c6382c808e29cbeecae1985b9
-
SHA512
8b876db085943df393c32c8971db72e496a4e67c414e500c4c70239fe295a0e190ce041fed56839de5f23637e857931e9bf819820f45bc9e6b03d695c1ca5557
-
SSDEEP
98304:OTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdA/j9Tz5C:4Y4sBI0IZFC/jF5C
Static task
static1
Behavioral task
behavioral1
Sample
2025-07-01_755eb5ec7dfaa874cbd0b8399dc1a631_amadey_black-basta_coinminer_darkgate_elex_hijackloader_.exe
Resource
win10v2004-20250619-en
Malware Config
Targets
-
-
Target
2025-07-01_755eb5ec7dfaa874cbd0b8399dc1a631_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop
-
Size
5.7MB
-
MD5
755eb5ec7dfaa874cbd0b8399dc1a631
-
SHA1
93a49f3d6f8f9fdbf772128528e298264fde3c79
-
SHA256
b2e630b1098ed7ecc6e4bf43695ff84f9963595c6382c808e29cbeecae1985b9
-
SHA512
8b876db085943df393c32c8971db72e496a4e67c414e500c4c70239fe295a0e190ce041fed56839de5f23637e857931e9bf819820f45bc9e6b03d695c1ca5557
-
SSDEEP
98304:OTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdA/j9Tz5C:4Y4sBI0IZFC/jF5C
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1