General
-
Target
file.exe
-
Size
607KB
-
Sample
230502-lyzqmacd7t
-
MD5
fec1bb333482a2e245660c0e4026f85d
-
SHA1
a08544a217c47a3d77292f013afa6d84f93f0821
-
SHA256
f90cac94e15dcd83102e845c4e1e10e244506615157f19b8dd816c1ce32fca1e
-
SHA512
f283cf4815219bf20672f86cfd81aa4eb1813863e168f0f21e44033d86d4df1d8e55e6ee214f293dd6734e33f24d556a8694b7d0b0c239fcc8762cae90016c9f
-
SSDEEP
12288:QTg6UFR4EGWlEUkx9RCDwGWzjuGW0IRlHoEM+fK:QExEWOXkqyGpKlo
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
amadey
3.70
tadogem.com/dF30Hn4m/index.php
Extracted
systembc
65.21.119.52:4277
localhost.exchange:4277
Targets
-
-
Target
file.exe
-
Size
607KB
-
MD5
fec1bb333482a2e245660c0e4026f85d
-
SHA1
a08544a217c47a3d77292f013afa6d84f93f0821
-
SHA256
f90cac94e15dcd83102e845c4e1e10e244506615157f19b8dd816c1ce32fca1e
-
SHA512
f283cf4815219bf20672f86cfd81aa4eb1813863e168f0f21e44033d86d4df1d8e55e6ee214f293dd6734e33f24d556a8694b7d0b0c239fcc8762cae90016c9f
-
SSDEEP
12288:QTg6UFR4EGWlEUkx9RCDwGWzjuGW0IRlHoEM+fK:QExEWOXkqyGpKlo
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-