General
-
Target
ebde61add0ff4e2a11d479edc5513f694022063bc2db8eebcdfb2fd9f2b6bfe3
-
Size
1.8MB
-
Sample
240326-xvpl2acg8y
-
MD5
644930f420117e3d11ac8391a9de30d5
-
SHA1
8ceea30914eb12ded4e9a3e6fb71723ff041ef58
-
SHA256
ebde61add0ff4e2a11d479edc5513f694022063bc2db8eebcdfb2fd9f2b6bfe3
-
SHA512
92dea7b748d373fc5571e19ea5018ac55fae990e755c9d4c45aa7a2209b62cd8b995564dad2708a4e5725a59e2fc936f9b45a60467e731c3ecf14b794816a1bd
-
SSDEEP
49152:N1WEzgWZv1PIbxfn7ealgtg8SWp2mjjf8zFmOP0KRS:Nx3p1Qf7eRt1SWl0zwOMKY
Static task
static1
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
ebde61add0ff4e2a11d479edc5513f694022063bc2db8eebcdfb2fd9f2b6bfe3
-
Size
1.8MB
-
MD5
644930f420117e3d11ac8391a9de30d5
-
SHA1
8ceea30914eb12ded4e9a3e6fb71723ff041ef58
-
SHA256
ebde61add0ff4e2a11d479edc5513f694022063bc2db8eebcdfb2fd9f2b6bfe3
-
SHA512
92dea7b748d373fc5571e19ea5018ac55fae990e755c9d4c45aa7a2209b62cd8b995564dad2708a4e5725a59e2fc936f9b45a60467e731c3ecf14b794816a1bd
-
SSDEEP
49152:N1WEzgWZv1PIbxfn7ealgtg8SWp2mjjf8zFmOP0KRS:Nx3p1Qf7eRt1SWl0zwOMKY
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-