General
-
Target
e1bf8c5f9fc8c88ccb13fb3e658e76d95a76e311d8c16bd6bf9ad15d565bc28a
-
Size
1.9MB
-
Sample
240327-a2pt2sga82
-
MD5
eb2c75e45581e2d852a3e76d44203340
-
SHA1
4a850d13331a3f70433c2a390360b8d60b28502e
-
SHA256
e1bf8c5f9fc8c88ccb13fb3e658e76d95a76e311d8c16bd6bf9ad15d565bc28a
-
SHA512
604bc68689052b6c7c1083d662c5b62951c08e128cb0e20aebb98eb99481c76b222b8abfa93e8e37049e48a934eff5b06430878cf23572ea00b75834ec671a1e
-
SSDEEP
49152:qKJblvhgzXVAgPCnQ0xfKggkTFhUvuwGO5IS:qqbHgZD4pxCs97S
Static task
static1
Behavioral task
behavioral1
Sample
e1bf8c5f9fc8c88ccb13fb3e658e76d95a76e311d8c16bd6bf9ad15d565bc28a.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
e1bf8c5f9fc8c88ccb13fb3e658e76d95a76e311d8c16bd6bf9ad15d565bc28a
-
Size
1.9MB
-
MD5
eb2c75e45581e2d852a3e76d44203340
-
SHA1
4a850d13331a3f70433c2a390360b8d60b28502e
-
SHA256
e1bf8c5f9fc8c88ccb13fb3e658e76d95a76e311d8c16bd6bf9ad15d565bc28a
-
SHA512
604bc68689052b6c7c1083d662c5b62951c08e128cb0e20aebb98eb99481c76b222b8abfa93e8e37049e48a934eff5b06430878cf23572ea00b75834ec671a1e
-
SSDEEP
49152:qKJblvhgzXVAgPCnQ0xfKggkTFhUvuwGO5IS:qqbHgZD4pxCs97S
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-