General
-
Target
fab6f5c11615b7b2814ab9e02d105f196c0781e19b5f67dc716b1f0f5cf0f141
-
Size
1.9MB
-
Sample
240329-vmq4sadg27
-
MD5
c4414cc9ec67035a4edb2f20cc56fcdd
-
SHA1
3b48efb50dcb74a1f3a71498d8b33aa802a85c3f
-
SHA256
fab6f5c11615b7b2814ab9e02d105f196c0781e19b5f67dc716b1f0f5cf0f141
-
SHA512
2b1e9d21a0c7788e4d2b83c82163414ef38ec91ec9401a175623056c16779448380bebc5da7d3325775147ed05eb3cfa4b3005d63267111618c5eab5377ba909
-
SSDEEP
49152:P/Cj9A6yiVvzsB4DReBG6BWphrxxjB8KrEm+sNEdPR241r:XCxy2uokBfApfxj3rEmhaPRJ1
Static task
static1
Behavioral task
behavioral1
Sample
fab6f5c11615b7b2814ab9e02d105f196c0781e19b5f67dc716b1f0f5cf0f141.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
fab6f5c11615b7b2814ab9e02d105f196c0781e19b5f67dc716b1f0f5cf0f141
-
Size
1.9MB
-
MD5
c4414cc9ec67035a4edb2f20cc56fcdd
-
SHA1
3b48efb50dcb74a1f3a71498d8b33aa802a85c3f
-
SHA256
fab6f5c11615b7b2814ab9e02d105f196c0781e19b5f67dc716b1f0f5cf0f141
-
SHA512
2b1e9d21a0c7788e4d2b83c82163414ef38ec91ec9401a175623056c16779448380bebc5da7d3325775147ed05eb3cfa4b3005d63267111618c5eab5377ba909
-
SSDEEP
49152:P/Cj9A6yiVvzsB4DReBG6BWphrxxjB8KrEm+sNEdPR241r:XCxy2uokBfApfxj3rEmhaPRJ1
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-