General
-
Target
7ef9c8f05fc2ebd6d393a97415401b01be80ab827b85f35370480f9e42852dc5.exe
-
Size
2.5MB
-
Sample
231207-sfljlscd52
-
MD5
91020e5674626296b45de52989d97be3
-
SHA1
e1c95086cdfe8525c673fa45d8c1310efb45ff4a
-
SHA256
7ef9c8f05fc2ebd6d393a97415401b01be80ab827b85f35370480f9e42852dc5
-
SHA512
22731558082adda43effe24732d9b4fb1fa5978a564cece18cc430eff9a4b0b5fa04424ac0027b0d3a09e21c12c531b44647e0b70e73372a1eb3b4b8ff00ba27
-
SSDEEP
49152:0yj4+45+Lf+4nClgIi23U8Qgy4RqX6vkJ2D/Z8n1oUDc8s0vXwV2x:0b+4wLf+4nCgMU8/y4Rm6vkJ2lK1jkap
Static task
static1
Behavioral task
behavioral1
Sample
7ef9c8f05fc2ebd6d393a97415401b01be80ab827b85f35370480f9e42852dc5.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
7ef9c8f05fc2ebd6d393a97415401b01be80ab827b85f35370480f9e42852dc5.exe
Resource
win10v2004-20231127-en
Malware Config
Extracted
amadey
4.13
http://185.172.128.125
-
install_dir
4fdb51ccdc
-
install_file
Utsysc.exe
-
strings_key
a70b05054314f381be1ab9a5cdc8b250
-
url_paths
/u6vhSc3PPq/index.php
Targets
-
-
Target
7ef9c8f05fc2ebd6d393a97415401b01be80ab827b85f35370480f9e42852dc5.exe
-
Size
2.5MB
-
MD5
91020e5674626296b45de52989d97be3
-
SHA1
e1c95086cdfe8525c673fa45d8c1310efb45ff4a
-
SHA256
7ef9c8f05fc2ebd6d393a97415401b01be80ab827b85f35370480f9e42852dc5
-
SHA512
22731558082adda43effe24732d9b4fb1fa5978a564cece18cc430eff9a4b0b5fa04424ac0027b0d3a09e21c12c531b44647e0b70e73372a1eb3b4b8ff00ba27
-
SSDEEP
49152:0yj4+45+Lf+4nClgIi23U8Qgy4RqX6vkJ2D/Z8n1oUDc8s0vXwV2x:0b+4wLf+4nCgMU8/y4Rm6vkJ2lK1jkap
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-