General
-
Target
a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998
-
Size
908KB
-
Sample
231203-2mcdysfg84
-
MD5
eace63ea1948f012941dd4a9b3ac3c94
-
SHA1
a405bafadae7f27a3dbe108e8690034fe45b3330
-
SHA256
a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998
-
SHA512
3350590ead968dd755accf8ae017c65601953707622cc8747a4fc884be9712a3426397797203720f6aa0725ef1077093797ce44237920ccdfd0dd7be046cf024
-
SSDEEP
24576:emL7X62LBPsHdB3irLKfM9WCjC3NnOBk5/s0v1n3:JW2LBECUCjC5l5k0v
Static task
static1
Behavioral task
behavioral1
Sample
a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998.exe
Resource
win7-20231023-en
Malware Config
Extracted
amadey
http://185.196.8.195
http://brodoyouevenlift.co.za
-
strings_key
f7f36516fd699a26f0da3d64fdf9988f
-
url_paths
/u6vhSc3PPq/index.php
/jjuhhsa73/index.php
/k92lsA3dpb/index.php
Targets
-
-
Target
a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998
-
Size
908KB
-
MD5
eace63ea1948f012941dd4a9b3ac3c94
-
SHA1
a405bafadae7f27a3dbe108e8690034fe45b3330
-
SHA256
a481b300f1cf5ec873245d16c0e0fdfc18f681cf2ee682b23d47dd0b122c4998
-
SHA512
3350590ead968dd755accf8ae017c65601953707622cc8747a4fc884be9712a3426397797203720f6aa0725ef1077093797ce44237920ccdfd0dd7be046cf024
-
SSDEEP
24576:emL7X62LBPsHdB3irLKfM9WCjC3NnOBk5/s0v1n3:JW2LBECUCjC5l5k0v
-
Detect PureLogs payload
-
Detect ZGRat V1
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-