General
-
Target
9f510a5dba8a60aa27641cac23f689882b40c06a21b76a5dcaec05b0933331fe
-
Size
1.8MB
-
Sample
240308-1d6e1age75
-
MD5
f0a4e94764b6f88907ce41337ef6cf60
-
SHA1
7e219ac92c8b89a8df7f728b14ecd1a7d5d95bd9
-
SHA256
9f510a5dba8a60aa27641cac23f689882b40c06a21b76a5dcaec05b0933331fe
-
SHA512
df74fc23cddfcce8d8802cabd8fc15868f8121edb1e4454c3133016e01db02a42b6698ac6e69f4ed18405d649afa8770026ffde23b5e4dab056c3c98b3b55a86
-
SSDEEP
49152:yf3/fjhSzWk8vAnGpkRiUv2ABEcM6DYSYz9ptwUqjc3:ofjhKlioBE36DY3JpL
Static task
static1
Behavioral task
behavioral1
Sample
9f510a5dba8a60aa27641cac23f689882b40c06a21b76a5dcaec05b0933331fe.exe
Resource
win7-20240221-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
risepro
193.233.132.62
Targets
-
-
Target
9f510a5dba8a60aa27641cac23f689882b40c06a21b76a5dcaec05b0933331fe
-
Size
1.8MB
-
MD5
f0a4e94764b6f88907ce41337ef6cf60
-
SHA1
7e219ac92c8b89a8df7f728b14ecd1a7d5d95bd9
-
SHA256
9f510a5dba8a60aa27641cac23f689882b40c06a21b76a5dcaec05b0933331fe
-
SHA512
df74fc23cddfcce8d8802cabd8fc15868f8121edb1e4454c3133016e01db02a42b6698ac6e69f4ed18405d649afa8770026ffde23b5e4dab056c3c98b3b55a86
-
SSDEEP
49152:yf3/fjhSzWk8vAnGpkRiUv2ABEcM6DYSYz9ptwUqjc3:ofjhKlioBE36DY3JpL
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1