General
-
Target
4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93
-
Size
1.1MB
-
Sample
230426-wj5cnscg9v
-
MD5
aaa56b626ee20a06dc9739f217d58a8c
-
SHA1
3b7e3f2b8cd3c0a891e5ee9244d5a63b3e914cf9
-
SHA256
4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93
-
SHA512
5712669ae491f470584e4c8a9210f87bc2e1fc5453913212c0246d6f23d9d728311ccd520e9fcc11af24c0f98b253e01223306373ebb025cf118f0d2881dd938
-
SSDEEP
24576:+yK3rW34AOTA5KFAXMrmYaqS8ovaSsF6S2xjPlc2xcyANy+njjC:NKbWo37F2MrmYaqS8oSSssrb2yG
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93
-
Size
1.1MB
-
MD5
aaa56b626ee20a06dc9739f217d58a8c
-
SHA1
3b7e3f2b8cd3c0a891e5ee9244d5a63b3e914cf9
-
SHA256
4e2372f78b6f8078102eef370c0ea6c8106ec57939e84c422f2f06461efa1b93
-
SHA512
5712669ae491f470584e4c8a9210f87bc2e1fc5453913212c0246d6f23d9d728311ccd520e9fcc11af24c0f98b253e01223306373ebb025cf118f0d2881dd938
-
SSDEEP
24576:+yK3rW34AOTA5KFAXMrmYaqS8ovaSsF6S2xjPlc2xcyANy+njjC:NKbWo37F2MrmYaqS8oSSssrb2yG
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-