General

  • Target

    2025-07-01_d51ff1dbedc663a729ca7b20c3b7d5f1_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop

  • Size

    5.3MB

  • Sample

    250701-kaawxstly8

  • MD5

    d51ff1dbedc663a729ca7b20c3b7d5f1

  • SHA1

    6b5b14410720a3a06a224b041ee0de67f4188609

  • SHA256

    d2c01a2ad4639ce87e8cb531551510370580064aed309118d76dc0f2f86fa619

  • SHA512

    37d68bce332e605fafe47dafbe13a58acda871e5bb84b498c7b4bb352c76b5e05a4c0a4ae5cb66feb1e1bbde97a4300a4ffb73d756d6c0dbb849003e18cf8e18

  • SSDEEP

    98304:aTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdJmRUcf:8Y4sBI0IZF1c

Malware Config

Targets

    • Target

      2025-07-01_d51ff1dbedc663a729ca7b20c3b7d5f1_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop

    • Size

      5.3MB

    • MD5

      d51ff1dbedc663a729ca7b20c3b7d5f1

    • SHA1

      6b5b14410720a3a06a224b041ee0de67f4188609

    • SHA256

      d2c01a2ad4639ce87e8cb531551510370580064aed309118d76dc0f2f86fa619

    • SHA512

      37d68bce332e605fafe47dafbe13a58acda871e5bb84b498c7b4bb352c76b5e05a4c0a4ae5cb66feb1e1bbde97a4300a4ffb73d756d6c0dbb849003e18cf8e18

    • SSDEEP

      98304:aTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdJmRUcf:8Y4sBI0IZF1c

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks