General
-
Target
93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e.zip
-
Size
790KB
-
Sample
231125-lghe1sad9w
-
MD5
6ed5f3e9842fa0445d807b8a920ce288
-
SHA1
397fc86dfefe7dcbeb3e0cc5bcac5e22c4233eb7
-
SHA256
fd3b8c678ab187c425cdad9a4be8aa066782d9bdceb88a3dcaa19e56f170ef25
-
SHA512
0d23ae875e92bf0888e91881acc88822bb8476bca2c0299c3f8b2ed646384f94e9779b6a6230787bba103e110b2d6786855aad9cb4d175cb01324366472e7d3e
-
SSDEEP
12288:nYVHTakWWJEUCj94IEb0PRcI2yaOK1hurcqze1w9fR/anpQzVBlpaOQVdLZuAG:nyTa8pKpiI2EQhugq618/anK32OQVdL2
Static task
static1
Behavioral task
behavioral1
Sample
93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e.exe
Resource
win7-20231020-en
Malware Config
Extracted
amadey
4.13
http://65.108.99.238
http://brodoyouevenlift.co.za
-
strings_key
bda044f544861e32e95f5d49b3939bcc
-
url_paths
/yXNwKVfkS28Y/index.php
/g5ddWs/index.php
/pOVxaw24d/index.php
Targets
-
-
Target
93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e.exe
-
Size
1.5MB
-
MD5
6866f4e7450d085b19ad1aa9adaca819
-
SHA1
4afc3a0de610f45dbf8eb83da2a16052c2a81b01
-
SHA256
93583dfa872b44e13e449cdfbbe20e64851dbe0e615f30b0313d2cb6a9b2309e
-
SHA512
4d35943770423afe92784836a0aeb2d69c6d929d6208b2d3bd5dd347f54a58e4bcc2e074fc8a930d0d6fbddc3dc4082b362aced683d81966ed488e22d7b9c7c8
-
SSDEEP
24576:NQIsq2Q2GOAO4fCCy7gtsICmEly/nDBRyqni3xbU4eWxDJ3YsXv6+tH9ZPz1:NQIsq2Q2GOAO4fCZ7YsL8/KqihAsxDJX
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-