General
-
Target
3c16fa4ebcf3fbab654c0fde73d78375ffa91e38ee9113725b2e5eecbf647b09
-
Size
1.9MB
-
Sample
240208-xcpjbaba68
-
MD5
9f1f0f93608d7e896cbbcd66351e64b0
-
SHA1
e6ee75122ff1d1ad86616c0048bf7d8048302f2a
-
SHA256
3c16fa4ebcf3fbab654c0fde73d78375ffa91e38ee9113725b2e5eecbf647b09
-
SHA512
fb4c5f5b5aa89b8ccc8e0f6510d1a036c93d848c9779ca00b84f1d2dfeca1bce4728e49e35d0ee9fbd7fec238049cb4c9e758f034cdce78a6e1bb68aacfb38ae
-
SSDEEP
49152:/huY/sSpkBRTg8Vd8/typYGq8abHuof7r:l/MBBg8j8VypYLKoj
Static task
static1
Behavioral task
behavioral1
Sample
3c16fa4ebcf3fbab654c0fde73d78375ffa91e38ee9113725b2e5eecbf647b09.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c16fa4ebcf3fbab654c0fde73d78375ffa91e38ee9113725b2e5eecbf647b09.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Targets
-
-
Target
3c16fa4ebcf3fbab654c0fde73d78375ffa91e38ee9113725b2e5eecbf647b09
-
Size
1.9MB
-
MD5
9f1f0f93608d7e896cbbcd66351e64b0
-
SHA1
e6ee75122ff1d1ad86616c0048bf7d8048302f2a
-
SHA256
3c16fa4ebcf3fbab654c0fde73d78375ffa91e38ee9113725b2e5eecbf647b09
-
SHA512
fb4c5f5b5aa89b8ccc8e0f6510d1a036c93d848c9779ca00b84f1d2dfeca1bce4728e49e35d0ee9fbd7fec238049cb4c9e758f034cdce78a6e1bb68aacfb38ae
-
SSDEEP
49152:/huY/sSpkBRTg8Vd8/typYGq8abHuof7r:l/MBBg8j8VypYLKoj
-
Detects LgoogLoader payload
-
LgoogLoader
A downloader capable of dropping and executing other malware families.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2