General
-
Target
9a41d33683ee537a8bc637dca63c03788759889f7d2687df3346d383b1054f29
-
Size
1.2MB
-
Sample
230420-h8elnaac7x
-
MD5
04238299ab12822748ded33295dfacbf
-
SHA1
d3e9b6d62f47222ef31645e72ded0a1930d2a66b
-
SHA256
9a41d33683ee537a8bc637dca63c03788759889f7d2687df3346d383b1054f29
-
SHA512
764f0678d2d68789f3cb3755db4fc442b88ac0705f5fbb07edd53c4097cdedf3f398ea425880c971127b8d22dbc25e327d5c8e0d18cd3b110a060f3d34a288f6
-
SSDEEP
24576:FyIG7e4RD89QEXw/KiTYct+o8mV7iUm5v4yYQ0wcUVA:gR7epa/KPct+oRiVvbPTRV
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
9a41d33683ee537a8bc637dca63c03788759889f7d2687df3346d383b1054f29
-
Size
1.2MB
-
MD5
04238299ab12822748ded33295dfacbf
-
SHA1
d3e9b6d62f47222ef31645e72ded0a1930d2a66b
-
SHA256
9a41d33683ee537a8bc637dca63c03788759889f7d2687df3346d383b1054f29
-
SHA512
764f0678d2d68789f3cb3755db4fc442b88ac0705f5fbb07edd53c4097cdedf3f398ea425880c971127b8d22dbc25e327d5c8e0d18cd3b110a060f3d34a288f6
-
SSDEEP
24576:FyIG7e4RD89QEXw/KiTYct+o8mV7iUm5v4yYQ0wcUVA:gR7epa/KPct+oRiVvbPTRV
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-