General
-
Target
f0f2948759d4d4773aa915b885fb244a6c9d1c956ebd4fa48bf86e7e925153d5
-
Size
1.8MB
-
Sample
240401-fml3haee72
-
MD5
f5e309ef18d77a0799375f564f5b2cb5
-
SHA1
802228d06033412a07502d062be3e09738b97c21
-
SHA256
f0f2948759d4d4773aa915b885fb244a6c9d1c956ebd4fa48bf86e7e925153d5
-
SHA512
10932e2a2bbc33668799a8a33e7a7ad908fa3cb078e4a1c50fa08c6f522f5a3a4c1f221552f2e402ee378194d70cb9b00a55bfdd7075d3725590bbec7ef9a24e
-
SSDEEP
49152:hzJRP8XHsNI8zBP/4vtutHYjqr6VZGaqYweRbCb60WCBu98:1JlkHSP40HYjhVwN+Su98
Static task
static1
Behavioral task
behavioral1
Sample
f0f2948759d4d4773aa915b885fb244a6c9d1c956ebd4fa48bf86e7e925153d5.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
f0f2948759d4d4773aa915b885fb244a6c9d1c956ebd4fa48bf86e7e925153d5
-
Size
1.8MB
-
MD5
f5e309ef18d77a0799375f564f5b2cb5
-
SHA1
802228d06033412a07502d062be3e09738b97c21
-
SHA256
f0f2948759d4d4773aa915b885fb244a6c9d1c956ebd4fa48bf86e7e925153d5
-
SHA512
10932e2a2bbc33668799a8a33e7a7ad908fa3cb078e4a1c50fa08c6f522f5a3a4c1f221552f2e402ee378194d70cb9b00a55bfdd7075d3725590bbec7ef9a24e
-
SSDEEP
49152:hzJRP8XHsNI8zBP/4vtutHYjqr6VZGaqYweRbCb60WCBu98:1JlkHSP40HYjhVwN+Su98
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-