General
-
Target
3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07
-
Size
490KB
-
Sample
230505-1h7tmaha9y
-
MD5
739b6a66d51536c99d15d7304529bd33
-
SHA1
65608d7e4def49c6a60bfbfe8978a1aeff5e16eb
-
SHA256
3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07
-
SHA512
6214876ccc3e7138653f316614417a94273c31fee7c7dac10b39e6a9ae936d170acc1607ff838283c49a8c08eb18a51ce8b62915c04f1f5553001be445030dec
-
SSDEEP
12288:9Mr+y90sovN/qYD/p6wC7QaxA8/9WCqlzYn:TyJRy8BEaxt8C4Mn
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07
-
Size
490KB
-
MD5
739b6a66d51536c99d15d7304529bd33
-
SHA1
65608d7e4def49c6a60bfbfe8978a1aeff5e16eb
-
SHA256
3458e9c4e61dcb869a2a6746f6019119f52b733ec24896afa7767c4abf408e07
-
SHA512
6214876ccc3e7138653f316614417a94273c31fee7c7dac10b39e6a9ae936d170acc1607ff838283c49a8c08eb18a51ce8b62915c04f1f5553001be445030dec
-
SSDEEP
12288:9Mr+y90sovN/qYD/p6wC7QaxA8/9WCqlzYn:TyJRy8BEaxt8C4Mn
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-