General
-
Target
1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1
-
Size
1.0MB
-
Sample
230417-r1411sef43
-
MD5
7ddfdb0e6901edbfb8a43c3aaf12da8d
-
SHA1
6fbbce929fd39a980263c8f725da1a108b3a1031
-
SHA256
1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1
-
SHA512
4db31bb5c6c7f30f257912fab1e1d33de66b3317f1ee0a00bd18123b69d5f7be2e2fb966e7382b96af977612a5d32d922027c2178cfc5cc67731f20605b5a8c8
-
SSDEEP
24576:TylyOOMjUHZRrw3GQu7YI064T73JTA0c:mddUHnwW9EI06Y3W0
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1
-
Size
1.0MB
-
MD5
7ddfdb0e6901edbfb8a43c3aaf12da8d
-
SHA1
6fbbce929fd39a980263c8f725da1a108b3a1031
-
SHA256
1b5803f66b61bc627b323bc2a5cac0b40527d214ee4038b28d22614844523ea1
-
SHA512
4db31bb5c6c7f30f257912fab1e1d33de66b3317f1ee0a00bd18123b69d5f7be2e2fb966e7382b96af977612a5d32d922027c2178cfc5cc67731f20605b5a8c8
-
SSDEEP
24576:TylyOOMjUHZRrw3GQu7YI064T73JTA0c:mddUHnwW9EI06Y3W0
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-