General
-
Target
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
-
Size
28.0MB
-
Sample
220521-b7b1tagdcl
-
MD5
05b666fa594fabf1f40b331f75609091
-
SHA1
9ea91b4d0e830bedaa11bcb3835c415527035692
-
SHA256
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea
-
SHA512
e3bb4a1833759acd5987c72954df220a3c49e9671412d28ff29a0397cf881aabab9c23e1689fe6bc94d8831287c082b4b94668653d9751abd3235f3fa7c410f7
Static task
static1
Behavioral task
behavioral1
Sample
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
amadey
3.07
89.163.249.231/panel/index.php
Targets
-
-
Target
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
-
Size
28.0MB
-
MD5
05b666fa594fabf1f40b331f75609091
-
SHA1
9ea91b4d0e830bedaa11bcb3835c415527035692
-
SHA256
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea
-
SHA512
e3bb4a1833759acd5987c72954df220a3c49e9671412d28ff29a0397cf881aabab9c23e1689fe6bc94d8831287c082b4b94668653d9751abd3235f3fa7c410f7
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-