General
-
Target
setup.exe
-
Size
1.0MB
-
Sample
230420-anb12agb9y
-
MD5
4382b0c31f4c6eba5a21fbe88c69fb51
-
SHA1
7222568b6b989621ccd4836eb56c6c6162b5d46c
-
SHA256
a587da4bac281de7ad580d061dac4fdd9ef3c3e76daae4d06f235296b2d235bc
-
SHA512
703484a48651eaa3a1487fb39e92a24e799b260c0c8e9599c342498732dd43c0307a0d0d73d16f4eaf80896438721b1459057b7ac920cad1bf2b3b9824845c1c
-
SSDEEP
24576:eyn/mx0J2SlMHv6JHkX7vHv8F4TAudbUl:tOtSlIvQWvHv8FMbU
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
setup.exe
-
Size
1.0MB
-
MD5
4382b0c31f4c6eba5a21fbe88c69fb51
-
SHA1
7222568b6b989621ccd4836eb56c6c6162b5d46c
-
SHA256
a587da4bac281de7ad580d061dac4fdd9ef3c3e76daae4d06f235296b2d235bc
-
SHA512
703484a48651eaa3a1487fb39e92a24e799b260c0c8e9599c342498732dd43c0307a0d0d73d16f4eaf80896438721b1459057b7ac920cad1bf2b3b9824845c1c
-
SSDEEP
24576:eyn/mx0J2SlMHv6JHkX7vHv8F4TAudbUl:tOtSlIvQWvHv8FMbU
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Modify Registry
3Virtualization/Sandbox Evasion
1