General

  • Target

    2025-05-11_31cebc12168ac3698573e2f00f470de3_amadey_elex_smoke-loader

  • Size

    3.6MB

  • Sample

    250511-f7pn5av1b1

  • MD5

    31cebc12168ac3698573e2f00f470de3

  • SHA1

    239b3b161fb0c4803c32300617bc7103f8eb9648

  • SHA256

    1ca347091ea1f04d139be0a9e315ef7e6a38517eff6c6ecf842850116836b56f

  • SHA512

    0622758481e6103b8ff934702125138210ea0d83624055bb6aaa2b960a64cad44d5c4cf46f701cc20c9c380f9f071b24007eda853836aa7a4dc5f5f1c01dd754

  • SSDEEP

    98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLC:0jJs

Malware Config

Targets

    • Target

      2025-05-11_31cebc12168ac3698573e2f00f470de3_amadey_elex_smoke-loader

    • Size

      3.6MB

    • MD5

      31cebc12168ac3698573e2f00f470de3

    • SHA1

      239b3b161fb0c4803c32300617bc7103f8eb9648

    • SHA256

      1ca347091ea1f04d139be0a9e315ef7e6a38517eff6c6ecf842850116836b56f

    • SHA512

      0622758481e6103b8ff934702125138210ea0d83624055bb6aaa2b960a64cad44d5c4cf46f701cc20c9c380f9f071b24007eda853836aa7a4dc5f5f1c01dd754

    • SSDEEP

      98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLC:0jJs

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »