General
-
Target
73c5d9e43e4b6e5c6ba65b7dae9c0fb32f77a1700fc070bc196b30352f1b258f
-
Size
1.9MB
-
Sample
240320-rkfy9aac92
-
MD5
63d5469fa882500882de9a0507a978ff
-
SHA1
1325a250d3cd329e2d80531b156a5684b107c0ff
-
SHA256
73c5d9e43e4b6e5c6ba65b7dae9c0fb32f77a1700fc070bc196b30352f1b258f
-
SHA512
eb0329f192c50a57468deeca060eed775e7691633653870f6a5514b4d0a0393745fec8bfe042c5441a2e2b6ebfa2628fa95196074f7d893b153736af80b39d4d
-
SSDEEP
49152:VFmBNlE2+2flGqTu5nUa/H+Hebaaym/a2kUD:vmDNflF5a/+HeCm/aNk
Static task
static1
Behavioral task
behavioral1
Sample
73c5d9e43e4b6e5c6ba65b7dae9c0fb32f77a1700fc070bc196b30352f1b258f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
73c5d9e43e4b6e5c6ba65b7dae9c0fb32f77a1700fc070bc196b30352f1b258f
-
Size
1.9MB
-
MD5
63d5469fa882500882de9a0507a978ff
-
SHA1
1325a250d3cd329e2d80531b156a5684b107c0ff
-
SHA256
73c5d9e43e4b6e5c6ba65b7dae9c0fb32f77a1700fc070bc196b30352f1b258f
-
SHA512
eb0329f192c50a57468deeca060eed775e7691633653870f6a5514b4d0a0393745fec8bfe042c5441a2e2b6ebfa2628fa95196074f7d893b153736af80b39d4d
-
SSDEEP
49152:VFmBNlE2+2flGqTu5nUa/H+Hebaaym/a2kUD:vmDNflF5a/+HeCm/aNk
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-