General
-
Target
2025-07-01_d51ff1dbedc663a729ca7b20c3b7d5f1_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop
-
Size
5.3MB
-
Sample
250701-kaawxstly8
-
MD5
d51ff1dbedc663a729ca7b20c3b7d5f1
-
SHA1
6b5b14410720a3a06a224b041ee0de67f4188609
-
SHA256
d2c01a2ad4639ce87e8cb531551510370580064aed309118d76dc0f2f86fa619
-
SHA512
37d68bce332e605fafe47dafbe13a58acda871e5bb84b498c7b4bb352c76b5e05a4c0a4ae5cb66feb1e1bbde97a4300a4ffb73d756d6c0dbb849003e18cf8e18
-
SSDEEP
98304:aTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdJmRUcf:8Y4sBI0IZF1c
Static task
static1
Behavioral task
behavioral1
Sample
2025-07-01_d51ff1dbedc663a729ca7b20c3b7d5f1_amadey_black-basta_coinminer_darkgate_elex_hijackloader_.exe
Resource
win10v2004-20250610-en
Malware Config
Targets
-
-
Target
2025-07-01_d51ff1dbedc663a729ca7b20c3b7d5f1_amadey_black-basta_coinminer_darkgate_elex_hijackloader_luca-stealer_rhadamanthys_smoke-loader_stop
-
Size
5.3MB
-
MD5
d51ff1dbedc663a729ca7b20c3b7d5f1
-
SHA1
6b5b14410720a3a06a224b041ee0de67f4188609
-
SHA256
d2c01a2ad4639ce87e8cb531551510370580064aed309118d76dc0f2f86fa619
-
SHA512
37d68bce332e605fafe47dafbe13a58acda871e5bb84b498c7b4bb352c76b5e05a4c0a4ae5cb66feb1e1bbde97a4300a4ffb73d756d6c0dbb849003e18cf8e18
-
SSDEEP
98304:aTvggVssYOXwnS4rVGpYOXwnS4rVkzp9/j/tpA4gBWGabdJmRUcf:8Y4sBI0IZF1c
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1