General
-
Target
bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b
-
Size
1.9MB
-
Sample
240321-2nvlxscd54
-
MD5
96963bcaed78a2050dadcfd692889089
-
SHA1
c3a8f2aa6d4731d152ee7bbd3fce85be1658b2c3
-
SHA256
bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b
-
SHA512
1ec9f4baa59e03ccf2c92ab6568b061e1d6af0c9b91433fb71017d1de5da52d1d774ebf7263f77d955bd526ff52394f22c732d38912424df7c5d607d8f49169c
-
SSDEEP
49152:0L/Xewfrl1sLubHESwnVnqTsn0koWi8DM:k/Xlj7sLoHESwnlqwnvoWnM
Static task
static1
Behavioral task
behavioral1
Sample
bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b.exe
Resource
win7-20240221-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b
-
Size
1.9MB
-
MD5
96963bcaed78a2050dadcfd692889089
-
SHA1
c3a8f2aa6d4731d152ee7bbd3fce85be1658b2c3
-
SHA256
bc440f90929db3adf521bb8e84487f11fed0dde618f5ca3ee2382652783ea01b
-
SHA512
1ec9f4baa59e03ccf2c92ab6568b061e1d6af0c9b91433fb71017d1de5da52d1d774ebf7263f77d955bd526ff52394f22c732d38912424df7c5d607d8f49169c
-
SSDEEP
49152:0L/Xewfrl1sLubHESwnVnqTsn0koWi8DM:k/Xlj7sLoHESwnlqwnvoWnM
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-