General
-
Target
a95d87cc80a8e72019154b6344fa960a858b61952b6789eb25679219b2257b48
-
Size
1.8MB
-
Sample
240322-ngk71sde3w
-
MD5
d12388df00a732463f4f6ac63ffa7da5
-
SHA1
a6ee66aacb034a29ee81e5bb018254948bd4c86e
-
SHA256
a95d87cc80a8e72019154b6344fa960a858b61952b6789eb25679219b2257b48
-
SHA512
bf86128b4e4f4099cf2849d937e281750210adb0bf129d7a442ba5cbf9ebe26f484a7bd8f6506fed31d73d22e7b13bd2c58ac49898d9f2710359b91ec7d6417c
-
SSDEEP
49152:X8kVxKEXKG0k0N2YKDdpBr5JH9G4sbVtSpECX+4s3pEz:XXVxKpjN2Ldp1dtOGPu4X
Static task
static1
Behavioral task
behavioral1
Sample
a95d87cc80a8e72019154b6344fa960a858b61952b6789eb25679219b2257b48.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
a95d87cc80a8e72019154b6344fa960a858b61952b6789eb25679219b2257b48
-
Size
1.8MB
-
MD5
d12388df00a732463f4f6ac63ffa7da5
-
SHA1
a6ee66aacb034a29ee81e5bb018254948bd4c86e
-
SHA256
a95d87cc80a8e72019154b6344fa960a858b61952b6789eb25679219b2257b48
-
SHA512
bf86128b4e4f4099cf2849d937e281750210adb0bf129d7a442ba5cbf9ebe26f484a7bd8f6506fed31d73d22e7b13bd2c58ac49898d9f2710359b91ec7d6417c
-
SSDEEP
49152:X8kVxKEXKG0k0N2YKDdpBr5JH9G4sbVtSpECX+4s3pEz:XXVxKpjN2Ldp1dtOGPu4X
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1