General
-
Target
72cc7ecb49837771303a8f567a2b7dd2e7f5ad7790c5b3aa0011fb981106cb31.exe
-
Size
2.1MB
-
Sample
220521-jmak9abag4
-
MD5
06777de46e46ddf54d0dec2794ee292e
-
SHA1
ad05474b996e88be045de557af5d58238210b4ce
-
SHA256
72cc7ecb49837771303a8f567a2b7dd2e7f5ad7790c5b3aa0011fb981106cb31
-
SHA512
d781c4ea0efbff6de3eea7471c00520f8bd5941f050f7db8517715ad91c2dd881fab416dd40bd40aa30c50785453dae2e77c16eb23a7e17feca899b95b71abe8
Static task
static1
Behavioral task
behavioral1
Sample
72cc7ecb49837771303a8f567a2b7dd2e7f5ad7790c5b3aa0011fb981106cb31.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
72cc7ecb49837771303a8f567a2b7dd2e7f5ad7790c5b3aa0011fb981106cb31.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
amadey
3.04
185.215.113.47/k0uTrd3d/index.php
Targets
-
-
Target
72cc7ecb49837771303a8f567a2b7dd2e7f5ad7790c5b3aa0011fb981106cb31.exe
-
Size
2.1MB
-
MD5
06777de46e46ddf54d0dec2794ee292e
-
SHA1
ad05474b996e88be045de557af5d58238210b4ce
-
SHA256
72cc7ecb49837771303a8f567a2b7dd2e7f5ad7790c5b3aa0011fb981106cb31
-
SHA512
d781c4ea0efbff6de3eea7471c00520f8bd5941f050f7db8517715ad91c2dd881fab416dd40bd40aa30c50785453dae2e77c16eb23a7e17feca899b95b71abe8
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-