General
-
Target
9d6b9616a3a72da5cc4bf6a74fe356c22c5ca80380bf5c2ab58a5066a46ba6b2
-
Size
1.8MB
-
Sample
240324-ypbcwsfg48
-
MD5
fd25bd0f7589d7fe7a0dc5d15fd5b0a3
-
SHA1
7f22cb5f5dbf06e2e95d209c295113c3a213b89b
-
SHA256
9d6b9616a3a72da5cc4bf6a74fe356c22c5ca80380bf5c2ab58a5066a46ba6b2
-
SHA512
658f36bb7fadef57d42e49161d179535bf62fbfef83d3a7d1005e4091065fbeb640b4feb7fa2c8963992e837377bfe5d9e1dc5bb008cb9a9ca71c5750fc043e8
-
SSDEEP
24576:qN4M5aMn9MQnp2kICgzesyvBH2wBTXJii92Oiko5v35TvQpdA8PoipIOsyeoiaSs:naAvBesSBWwZt92OiBdhvqdBlsotS
Static task
static1
Behavioral task
behavioral1
Sample
9d6b9616a3a72da5cc4bf6a74fe356c22c5ca80380bf5c2ab58a5066a46ba6b2.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
9d6b9616a3a72da5cc4bf6a74fe356c22c5ca80380bf5c2ab58a5066a46ba6b2
-
Size
1.8MB
-
MD5
fd25bd0f7589d7fe7a0dc5d15fd5b0a3
-
SHA1
7f22cb5f5dbf06e2e95d209c295113c3a213b89b
-
SHA256
9d6b9616a3a72da5cc4bf6a74fe356c22c5ca80380bf5c2ab58a5066a46ba6b2
-
SHA512
658f36bb7fadef57d42e49161d179535bf62fbfef83d3a7d1005e4091065fbeb640b4feb7fa2c8963992e837377bfe5d9e1dc5bb008cb9a9ca71c5750fc043e8
-
SSDEEP
24576:qN4M5aMn9MQnp2kICgzesyvBH2wBTXJii92Oiko5v35TvQpdA8PoipIOsyeoiaSs:naAvBesSBWwZt92OiBdhvqdBlsotS
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-