General
-
Target
b96f3418290228cef99307a0d9bde410e2f0ae67c0a441724535709247087f7b
-
Size
1.9MB
-
Sample
240330-3k8j2shh68
-
MD5
6641bc47fed9d4d06a93a2a3d7ac2396
-
SHA1
2aa7a938b4ea5dc0ba6528b21a04dedbf068f07a
-
SHA256
b96f3418290228cef99307a0d9bde410e2f0ae67c0a441724535709247087f7b
-
SHA512
13faab75990ff705ab9e86266bec26887c0a8d32c43734ddc26ac2d321e91ab55b95c93d63ef11d1af7ee897b57a85b0242c7334d484a7267a49993255ca6423
-
SSDEEP
49152:98EQJi49hW8DRGQ/X4yQupnY/Y9VLMdDNiS:KzJNNu/+ItNiS
Static task
static1
Behavioral task
behavioral1
Sample
b96f3418290228cef99307a0d9bde410e2f0ae67c0a441724535709247087f7b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
b96f3418290228cef99307a0d9bde410e2f0ae67c0a441724535709247087f7b
-
Size
1.9MB
-
MD5
6641bc47fed9d4d06a93a2a3d7ac2396
-
SHA1
2aa7a938b4ea5dc0ba6528b21a04dedbf068f07a
-
SHA256
b96f3418290228cef99307a0d9bde410e2f0ae67c0a441724535709247087f7b
-
SHA512
13faab75990ff705ab9e86266bec26887c0a8d32c43734ddc26ac2d321e91ab55b95c93d63ef11d1af7ee897b57a85b0242c7334d484a7267a49993255ca6423
-
SSDEEP
49152:98EQJi49hW8DRGQ/X4yQupnY/Y9VLMdDNiS:KzJNNu/+ItNiS
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-