General
-
Target
f9663b2fa5f566d4775cda0e040a9a43270dc9b8f8e8cef7c3305b8ad6516293
-
Size
1.8MB
-
Sample
240330-2hxt4agc2v
-
MD5
a4e1de5808fd321bb919321345057b9c
-
SHA1
f314849781201e9e5c5a90a7469c728a9fb85dca
-
SHA256
f9663b2fa5f566d4775cda0e040a9a43270dc9b8f8e8cef7c3305b8ad6516293
-
SHA512
9f0968b6617bd2e7dee3b10606f4620afbaba23f68eaaab99e15cce0fe63a004bd7891a0ea3c541a5865dd97a25982fffc02c5e37aa10b504dc12b2e90fc3d24
-
SSDEEP
49152:JKPYa14M/y9PN17sg/z+vr7/x0QzMTOZBbrbK:JKH//SPN1og/s/x0Qz2OTm
Static task
static1
Behavioral task
behavioral1
Sample
f9663b2fa5f566d4775cda0e040a9a43270dc9b8f8e8cef7c3305b8ad6516293.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
f9663b2fa5f566d4775cda0e040a9a43270dc9b8f8e8cef7c3305b8ad6516293
-
Size
1.8MB
-
MD5
a4e1de5808fd321bb919321345057b9c
-
SHA1
f314849781201e9e5c5a90a7469c728a9fb85dca
-
SHA256
f9663b2fa5f566d4775cda0e040a9a43270dc9b8f8e8cef7c3305b8ad6516293
-
SHA512
9f0968b6617bd2e7dee3b10606f4620afbaba23f68eaaab99e15cce0fe63a004bd7891a0ea3c541a5865dd97a25982fffc02c5e37aa10b504dc12b2e90fc3d24
-
SSDEEP
49152:JKPYa14M/y9PN17sg/z+vr7/x0QzMTOZBbrbK:JKH//SPN1og/s/x0Qz2OTm
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-