General
-
Target
ef9c475eb2ec3660fb623e1ba966c531918f6afd4b610b71fd098a05b892d5d1
-
Size
1.8MB
-
Sample
240329-havvzscc84
-
MD5
483eaef6d08b7a5d6a720b9f4978aada
-
SHA1
83344a04fe22dec608f490fb48f7e887a8cd6a95
-
SHA256
ef9c475eb2ec3660fb623e1ba966c531918f6afd4b610b71fd098a05b892d5d1
-
SHA512
8d0de7782d711712ab5b9dbf63b8666c1071703f18c5f9225ac99ea8a32ce6369cfec74fd67c41b135392b38d312e4b13e35d209f848db995a2e67f92ee6ec1c
-
SSDEEP
24576:ojjHx98CRHOR0A5byf7pZoTZnF2XzXSYYIJb+oviZqhKsb7/LWZrteMSoY6xJP4z:YHbr1208byjjXztvi1ccZSt0k
Static task
static1
Behavioral task
behavioral1
Sample
ef9c475eb2ec3660fb623e1ba966c531918f6afd4b610b71fd098a05b892d5d1.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
ef9c475eb2ec3660fb623e1ba966c531918f6afd4b610b71fd098a05b892d5d1
-
Size
1.8MB
-
MD5
483eaef6d08b7a5d6a720b9f4978aada
-
SHA1
83344a04fe22dec608f490fb48f7e887a8cd6a95
-
SHA256
ef9c475eb2ec3660fb623e1ba966c531918f6afd4b610b71fd098a05b892d5d1
-
SHA512
8d0de7782d711712ab5b9dbf63b8666c1071703f18c5f9225ac99ea8a32ce6369cfec74fd67c41b135392b38d312e4b13e35d209f848db995a2e67f92ee6ec1c
-
SSDEEP
24576:ojjHx98CRHOR0A5byf7pZoTZnF2XzXSYYIJb+oviZqhKsb7/LWZrteMSoY6xJP4z:YHbr1208byjjXztvi1ccZSt0k
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-