General
-
Target
13e5d440ca2c27e4b83569c68b0d30140be4fe3f7ba8544fdff60fde594572bc
-
Size
1.8MB
-
Sample
240330-kbnt6scd73
-
MD5
0a472907022de0d3b2460ae9b22e32e5
-
SHA1
5b84bdb3b1ffcb4448c9f03fabc3b5f6d6a2c60c
-
SHA256
13e5d440ca2c27e4b83569c68b0d30140be4fe3f7ba8544fdff60fde594572bc
-
SHA512
d8c5008c9d63d09635d500054986b64e71f83f4aa77550a1d702ae5f0c96d78062d2c4e89035c47279f5d64af9bf1237c44f0c5baa1573eaa8af38121745a8c1
-
SSDEEP
49152:oNXWm+0NDZgO8ClqMXFhBdX9E3ZIlYobXFmyUEJ+h/PnkdYSRu+Y3wyFHr:Q6KDhl79E3ZIlJXFJT+hqYSU+Y3z
Static task
static1
Behavioral task
behavioral1
Sample
13e5d440ca2c27e4b83569c68b0d30140be4fe3f7ba8544fdff60fde594572bc.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
13e5d440ca2c27e4b83569c68b0d30140be4fe3f7ba8544fdff60fde594572bc
-
Size
1.8MB
-
MD5
0a472907022de0d3b2460ae9b22e32e5
-
SHA1
5b84bdb3b1ffcb4448c9f03fabc3b5f6d6a2c60c
-
SHA256
13e5d440ca2c27e4b83569c68b0d30140be4fe3f7ba8544fdff60fde594572bc
-
SHA512
d8c5008c9d63d09635d500054986b64e71f83f4aa77550a1d702ae5f0c96d78062d2c4e89035c47279f5d64af9bf1237c44f0c5baa1573eaa8af38121745a8c1
-
SSDEEP
49152:oNXWm+0NDZgO8ClqMXFhBdX9E3ZIlYobXFmyUEJ+h/PnkdYSRu+Y3wyFHr:Q6KDhl79E3ZIlJXFJT+hqYSU+Y3z
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-