General
-
Target
13cac8771d5bdf04a533f9d4af84f8d0aa240a2cfe85603beb9782c5261a4216
-
Size
1.8MB
-
Sample
240321-zcxk2ahf75
-
MD5
766b871e4a0cb690ef3697fd81f3f2d8
-
SHA1
ce86761569a375c6dfa22bd5707125b05207e3dd
-
SHA256
13cac8771d5bdf04a533f9d4af84f8d0aa240a2cfe85603beb9782c5261a4216
-
SHA512
a32336ad9b4fec2697de85af6404a69f0b9ab0390fb16f7206c2090911afadc60677b72c790e135993048e5663efbbe86b192d020b1644b5ec2db0e8b9d4cc7c
-
SSDEEP
49152:8o2laJ5uUQi8UU1k60147XalQIhYMNm8w0S/W6:8VaGUQi8UU1kF14TpuKUS/W6
Static task
static1
Behavioral task
behavioral1
Sample
13cac8771d5bdf04a533f9d4af84f8d0aa240a2cfe85603beb9782c5261a4216.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Targets
-
-
Target
13cac8771d5bdf04a533f9d4af84f8d0aa240a2cfe85603beb9782c5261a4216
-
Size
1.8MB
-
MD5
766b871e4a0cb690ef3697fd81f3f2d8
-
SHA1
ce86761569a375c6dfa22bd5707125b05207e3dd
-
SHA256
13cac8771d5bdf04a533f9d4af84f8d0aa240a2cfe85603beb9782c5261a4216
-
SHA512
a32336ad9b4fec2697de85af6404a69f0b9ab0390fb16f7206c2090911afadc60677b72c790e135993048e5663efbbe86b192d020b1644b5ec2db0e8b9d4cc7c
-
SSDEEP
49152:8o2laJ5uUQi8UU1k60147XalQIhYMNm8w0S/W6:8VaGUQi8UU1kF14TpuKUS/W6
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-