General

  • Target

    2025-07-03_5c9b11a9dccb0d0ad18bc5fb46b2e2fb_amadey_black-basta_darkgate_elex_luca-stealer_rhadamanthys_smoke-loader_stop

  • Size

    11.0MB

  • Sample

    250703-gkfclsfl5z

  • MD5

    5c9b11a9dccb0d0ad18bc5fb46b2e2fb

  • SHA1

    31d9b75706cfdbc4a2188d4b5c71ede940c7e6e7

  • SHA256

    0c33af31fa641e28c69c5d6397161e8f27bb64d7431f2468361d000a5c163480

  • SHA512

    f2660d9127057df6a28edb3110bedc50f7b71ba7d44657cd5a9ac12e3a855abdcc1cfb6bec3a9f7417a7b6de8f063ee348883b6cef8853045d0d82994087cd82

  • SSDEEP

    196608:mIG1Jjj14Ypb1+b8wwxCYP1WNZWM4tJiwy7/jF5C:mIG1Jjj1p1+s5ZinF5C

Malware Config

Targets

    • Target

      2025-07-03_5c9b11a9dccb0d0ad18bc5fb46b2e2fb_amadey_black-basta_darkgate_elex_luca-stealer_rhadamanthys_smoke-loader_stop

    • Size

      11.0MB

    • MD5

      5c9b11a9dccb0d0ad18bc5fb46b2e2fb

    • SHA1

      31d9b75706cfdbc4a2188d4b5c71ede940c7e6e7

    • SHA256

      0c33af31fa641e28c69c5d6397161e8f27bb64d7431f2468361d000a5c163480

    • SHA512

      f2660d9127057df6a28edb3110bedc50f7b71ba7d44657cd5a9ac12e3a855abdcc1cfb6bec3a9f7417a7b6de8f063ee348883b6cef8853045d0d82994087cd82

    • SSDEEP

      196608:mIG1Jjj14Ypb1+b8wwxCYP1WNZWM4tJiwy7/jF5C:mIG1Jjj1p1+s5ZinF5C

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks