General
-
Target
ac1d0cace79a6d630d2b6d8600a0c2e3a9da3ed0bff61f682406e8955b8569ef
-
Size
490KB
-
Sample
230505-24cq2shc9s
-
MD5
ad5348d98b63af7a756056868e56137e
-
SHA1
68c22fd635406957078a28365b75c2b09ae1327e
-
SHA256
ac1d0cace79a6d630d2b6d8600a0c2e3a9da3ed0bff61f682406e8955b8569ef
-
SHA512
93ac549481fb5b4b3dac5e346d79b1631a0d9e2916489b41e8a16b5dcdc5b4bd28c17baf703a6c7d279d7285790435ab3781fd3944493e35114b5d24b245d760
-
SSDEEP
6144:KMy+bnr+4p0yN90QEtjicFknS7eIgXsTMzraCu44SCe1rqwhJv7g6zAUD+3NJ19Y:sMrMy90jOykSqvXtaCnt1ht7gRUELAL
Static task
static1
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Targets
-
-
Target
ac1d0cace79a6d630d2b6d8600a0c2e3a9da3ed0bff61f682406e8955b8569ef
-
Size
490KB
-
MD5
ad5348d98b63af7a756056868e56137e
-
SHA1
68c22fd635406957078a28365b75c2b09ae1327e
-
SHA256
ac1d0cace79a6d630d2b6d8600a0c2e3a9da3ed0bff61f682406e8955b8569ef
-
SHA512
93ac549481fb5b4b3dac5e346d79b1631a0d9e2916489b41e8a16b5dcdc5b4bd28c17baf703a6c7d279d7285790435ab3781fd3944493e35114b5d24b245d760
-
SSDEEP
6144:KMy+bnr+4p0yN90QEtjicFknS7eIgXsTMzraCu44SCe1rqwhJv7g6zAUD+3NJ19Y:sMrMy90jOykSqvXtaCnt1ht7gRUELAL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-