General
-
Target
a6a401938ad109bdc201d54d541d914fd29ea4fa3f37c1261a43133e66e88842
-
Size
1.8MB
-
Sample
240315-bkp9xseh64
-
MD5
f9d29ef85549b22ba04c21a1fa99f0e5
-
SHA1
c1a9eda5dd68ce144c58d55d85f6151cb8f3bf22
-
SHA256
a6a401938ad109bdc201d54d541d914fd29ea4fa3f37c1261a43133e66e88842
-
SHA512
e792f98b6a657ba7cd92b193e945a7195ea183ebe81475b2f5fd82e8b8280b8cbf9e78e62437c04ae6d825a22d9607def5b41bc48e30c4ee528123af43c76162
-
SSDEEP
49152:w+bPRxFddfs3VCSapKGJD7LFCrjhhjqnFvk:w+bZxHHKUDlQjhdwm
Static task
static1
Behavioral task
behavioral1
Sample
a6a401938ad109bdc201d54d541d914fd29ea4fa3f37c1261a43133e66e88842.exe
Resource
win7-20240221-en
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Targets
-
-
Target
a6a401938ad109bdc201d54d541d914fd29ea4fa3f37c1261a43133e66e88842
-
Size
1.8MB
-
MD5
f9d29ef85549b22ba04c21a1fa99f0e5
-
SHA1
c1a9eda5dd68ce144c58d55d85f6151cb8f3bf22
-
SHA256
a6a401938ad109bdc201d54d541d914fd29ea4fa3f37c1261a43133e66e88842
-
SHA512
e792f98b6a657ba7cd92b193e945a7195ea183ebe81475b2f5fd82e8b8280b8cbf9e78e62437c04ae6d825a22d9607def5b41bc48e30c4ee528123af43c76162
-
SSDEEP
49152:w+bPRxFddfs3VCSapKGJD7LFCrjhhjqnFvk:w+bZxHHKUDlQjhdwm
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-