General
-
Target
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exe
-
Size
423KB
-
Sample
240201-e7yrcsbch4
-
MD5
1522b7c5e497da6783a21098b16fa9fd
-
SHA1
710640977a3444a6c80ccd3ccdcb846586356328
-
SHA256
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9eaf016eb2dac6fd6c1b8
-
SHA512
25d17615000a928dc11e24377f373a2d2bf406c4b0cfde19d42cc54c0605e5f31dd52b55c32dc0c32374795b101aff4fa4d30a75d8a6671ddb6b8a988141a1ce
-
SSDEEP
12288:amsJS4JF4LAIc+YGrlsh8I0wi/ajmCau5O9MB6:mS4JF4LAIc+YOliHiu6M
Behavioral task
behavioral1
Sample
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exe
Resource
win7-20231129-en
Malware Config
Extracted
amadey
4.17
http://51.81.69.127
-
install_dir
31feb4a22c
-
install_file
Dctooux.exe
-
strings_key
d97919b780e47328604ef358f75e629a
-
url_paths
/jPdsj3d4M/index.php
Targets
-
-
Target
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9e.exe
-
Size
423KB
-
MD5
1522b7c5e497da6783a21098b16fa9fd
-
SHA1
710640977a3444a6c80ccd3ccdcb846586356328
-
SHA256
3bb45ee150f445209bc66044d461a5bfd4c1ff424bc9eaf016eb2dac6fd6c1b8
-
SHA512
25d17615000a928dc11e24377f373a2d2bf406c4b0cfde19d42cc54c0605e5f31dd52b55c32dc0c32374795b101aff4fa4d30a75d8a6671ddb6b8a988141a1ce
-
SSDEEP
12288:amsJS4JF4LAIc+YGrlsh8I0wi/ajmCau5O9MB6:mS4JF4LAIc+YOliHiu6M
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-