General
-
Target
f9956b53c9df3bfe1252342e29d6a2932bea0b722bf556009f6fffa84bef8726
-
Size
1.8MB
-
Sample
240331-hnkbeafe5t
-
MD5
754a9b003b49e24c661a0ae381440df8
-
SHA1
58ea18bbde8ed4c50c206594e6e9613c0d2f8e55
-
SHA256
f9956b53c9df3bfe1252342e29d6a2932bea0b722bf556009f6fffa84bef8726
-
SHA512
36a517a856c6025e4a16d96378e94decb50049e190eaf6133248ecd7a514d28d654659d813ecf349a52a422c6f6cf7bf9e97a4784b8ce6138e89198c61618850
-
SSDEEP
49152:KC4DNboC/hEtu5hpckv2l9tKMK2P3KVgnM0vMp:KJbomKu51+xKG/KVWM0vMp
Static task
static1
Behavioral task
behavioral1
Sample
f9956b53c9df3bfe1252342e29d6a2932bea0b722bf556009f6fffa84bef8726.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Targets
-
-
Target
f9956b53c9df3bfe1252342e29d6a2932bea0b722bf556009f6fffa84bef8726
-
Size
1.8MB
-
MD5
754a9b003b49e24c661a0ae381440df8
-
SHA1
58ea18bbde8ed4c50c206594e6e9613c0d2f8e55
-
SHA256
f9956b53c9df3bfe1252342e29d6a2932bea0b722bf556009f6fffa84bef8726
-
SHA512
36a517a856c6025e4a16d96378e94decb50049e190eaf6133248ecd7a514d28d654659d813ecf349a52a422c6f6cf7bf9e97a4784b8ce6138e89198c61618850
-
SSDEEP
49152:KC4DNboC/hEtu5hpckv2l9tKMK2P3KVgnM0vMp:KJbomKu51+xKG/KVWM0vMp
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-