General
-
Target
379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5
-
Size
1.1MB
-
Sample
230419-25hzfsdh68
-
MD5
b043e0bddda6a78fcf7c6438fa9fc51c
-
SHA1
17ccba5ddef82cf4bec31af3208f065df5a23341
-
SHA256
379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5
-
SHA512
b771ac8538ced141ec5f7fbc3e9241217759c89ccfc16ca5af93e4d4e08ccbf02ae51074b65fabff069d67e6af2a2f9c9d0d6275274ba75259a45218b8ffb353
-
SSDEEP
24576:Eymiks+BkOVT3cFIu8nxAH+aFd4qdnhq0BTIR:TmihiPTcF78nxfaFZho
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5
-
Size
1.1MB
-
MD5
b043e0bddda6a78fcf7c6438fa9fc51c
-
SHA1
17ccba5ddef82cf4bec31af3208f065df5a23341
-
SHA256
379c7df574df0c5de1f917ec79d92b3c71c1ab44077021c608ec9fcc2af774f5
-
SHA512
b771ac8538ced141ec5f7fbc3e9241217759c89ccfc16ca5af93e4d4e08ccbf02ae51074b65fabff069d67e6af2a2f9c9d0d6275274ba75259a45218b8ffb353
-
SSDEEP
24576:Eymiks+BkOVT3cFIu8nxAH+aFd4qdnhq0BTIR:TmihiPTcF78nxfaFZho
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Modify Registry
3Virtualization/Sandbox Evasion
1