General
-
Target
53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057
-
Size
6.1MB
-
Sample
231210-j1z33acffj
-
MD5
65f1271aaa619686af548094f0909871
-
SHA1
b90b39e4ead147a91b62aee376900c3b15f6ae45
-
SHA256
53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057
-
SHA512
c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10
-
SSDEEP
98304:jyIq98BE2YOseQasRCRasGE3YMpktQRxBjvX2DZ4I/7HI4VpnzghDiK6/hXKz8fj:mYt+CbY1t4nyDZHJcDin/hG8r
Malware Config
Extracted
amadey
http://185.172.128.5
-
strings_key
11bb398ff31ee80d2c37571aecd1d36d
-
url_paths
/v8sjh3hs8/index.php
Extracted
amadey
4.13
http://185.172.128.5
-
install_dir
4fdb51ccdc
-
install_file
Utsysc.exe
-
strings_key
11bb398ff31ee80d2c37571aecd1d36d
-
url_paths
/v8sjh3hs8/index.php
Targets
-
-
Target
53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057
-
Size
6.1MB
-
MD5
65f1271aaa619686af548094f0909871
-
SHA1
b90b39e4ead147a91b62aee376900c3b15f6ae45
-
SHA256
53d538cde61bf707077dd3d2cc152d94531eb704f12e1c0e7eb70bd0f8ef4057
-
SHA512
c23eb12b735104516c1e440810915930bec1d1defb79ae29b2db5bf6ef3d1c8f18a5a41cffebde3ec6e2ba856989c334c47c1f25457203471ce5ac662e0bef10
-
SSDEEP
98304:jyIq98BE2YOseQasRCRasGE3YMpktQRxBjvX2DZ4I/7HI4VpnzghDiK6/hXKz8fj:mYt+CbY1t4nyDZHJcDin/hG8r
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-