General
-
Target
906f443ff2f5e59b38d0da12090ae17e.exe
-
Size
375KB
-
Sample
231203-t2368adc8v
-
MD5
906f443ff2f5e59b38d0da12090ae17e
-
SHA1
1e50f93e2a49cf1325c291eb8c491e00e84e80d8
-
SHA256
35444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
-
SHA512
f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
SSDEEP
6144:9bgwg3Zl1zv+E53TbUBdxz+xdcPX8aiirmcDtczEcmTPO3:90B1zv+2PUHJCdcfPiiyGCMW
Static task
static1
Behavioral task
behavioral1
Sample
906f443ff2f5e59b38d0da12090ae17e.exe
Resource
win7-20231201-en
Malware Config
Extracted
amadey
http://arrunda.ru
http://soetegem.com
http://tceducn.com
-
strings_key
eb714cabd2548b4a03c45f723f838bdc
-
url_paths
/forum/index.php
Extracted
amadey
4.11
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
-
install_dir
d4dd819322
-
install_file
Utsysc.exe
-
strings_key
8419b3024d6f72beef8af6915e592308
-
url_paths
/forum/index.php
Targets
-
-
Target
906f443ff2f5e59b38d0da12090ae17e.exe
-
Size
375KB
-
MD5
906f443ff2f5e59b38d0da12090ae17e
-
SHA1
1e50f93e2a49cf1325c291eb8c491e00e84e80d8
-
SHA256
35444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
-
SHA512
f4238ff549af3e0a20e53a98680de3b00db296aaf733f60992d9c7738f46febad44f4214b683c422f3dfd04d4389f3956e8076ffb6c13faa0be46e80c6012b68
-
SSDEEP
6144:9bgwg3Zl1zv+E53TbUBdxz+xdcPX8aiirmcDtczEcmTPO3:90B1zv+2PUHJCdcfPiiyGCMW
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-