General
-
Target
9bfee1fbe2227245f034be46ff38ec41aee4dd4de70b805f066f93f541813edb
-
Size
466KB
-
Sample
240322-sygndafd81
-
MD5
d28a2f08e3460bf6eeedd46c89fe3640
-
SHA1
14341aa393477ceb8a8d92e8297971167c7dd2de
-
SHA256
9bfee1fbe2227245f034be46ff38ec41aee4dd4de70b805f066f93f541813edb
-
SHA512
8812330ad2de22dc4a27fdfa709e162f6a3a7fab378273c84a7387f22707422289053dd63525c64af540e2108b19ead5116c22c389a6b4c16edcc5f7a1448038
-
SSDEEP
6144:x+kI608KFPoTbakmMnFypEq8TMXVXNQWghiPfrs7frLMU:EkITI/3Up390Nr3
Static task
static1
Behavioral task
behavioral1
Sample
9bfee1fbe2227245f034be46ff38ec41aee4dd4de70b805f066f93f541813edb.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
-
install_dir
154561dcbf
-
install_file
Dctooux.exe
-
strings_key
2cd47fa043c815e1a033c67832f3c6a5
-
url_paths
/j4Fvskd3/index.php
Targets
-
-
Target
9bfee1fbe2227245f034be46ff38ec41aee4dd4de70b805f066f93f541813edb
-
Size
466KB
-
MD5
d28a2f08e3460bf6eeedd46c89fe3640
-
SHA1
14341aa393477ceb8a8d92e8297971167c7dd2de
-
SHA256
9bfee1fbe2227245f034be46ff38ec41aee4dd4de70b805f066f93f541813edb
-
SHA512
8812330ad2de22dc4a27fdfa709e162f6a3a7fab378273c84a7387f22707422289053dd63525c64af540e2108b19ead5116c22c389a6b4c16edcc5f7a1448038
-
SSDEEP
6144:x+kI608KFPoTbakmMnFypEq8TMXVXNQWghiPfrs7frLMU:EkITI/3Up390Nr3
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-