General

  • Target

    2025-07-04_275ae99a5edd9ab7f228bf116c1b7662_amadey_elex_smoke-loader_stop

  • Size

    3.0MB

  • Sample

    250704-p2a38as1cw

  • MD5

    275ae99a5edd9ab7f228bf116c1b7662

  • SHA1

    1fefe8560623cb81bcda1d0983216633960f0805

  • SHA256

    20fe12b1301b8b9dcb18d6284ded7da1bf5b8d7b2170916a84cba6716fc20705

  • SHA512

    4f4c6575e9d5a9031ad6d93224c08bc96b0c9e2e062a52240b66d0edd7fb680f95eba11c4c1285710dc8d477eaa920b7b60eedda6601aaca1338faa426266513

  • SSDEEP

    49152:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLU:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLU

Malware Config

Targets

    • Target

      2025-07-04_275ae99a5edd9ab7f228bf116c1b7662_amadey_elex_smoke-loader_stop

    • Size

      3.0MB

    • MD5

      275ae99a5edd9ab7f228bf116c1b7662

    • SHA1

      1fefe8560623cb81bcda1d0983216633960f0805

    • SHA256

      20fe12b1301b8b9dcb18d6284ded7da1bf5b8d7b2170916a84cba6716fc20705

    • SHA512

      4f4c6575e9d5a9031ad6d93224c08bc96b0c9e2e062a52240b66d0edd7fb680f95eba11c4c1285710dc8d477eaa920b7b60eedda6601aaca1338faa426266513

    • SSDEEP

      49152:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLU:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLU

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks