General
-
Target
f32b2b73a11e9e6d3cae3366a3c366c931ab0c6aec2582df957aa34baa30b39c
-
Size
1.8MB
-
Sample
240401-fv9hrsed9y
-
MD5
c368875997d5bbb3402dc69dff22945b
-
SHA1
5f6aa2c23d066a04c2170fe75cf9095111689a25
-
SHA256
f32b2b73a11e9e6d3cae3366a3c366c931ab0c6aec2582df957aa34baa30b39c
-
SHA512
6eebb8de7121090c204200df2e601d0cc33851f82466ff5da0bbb4fd83c4baf473b445d362a4743b4eb50ec6a3928177c3bcb7a653ecc5fae77794da547d3960
-
SSDEEP
49152:pj7rhEr7TseSdfkMSPpH3WHKLhTGCn+DSA4:pqrXtGspxGQ+DSA
Static task
static1
Behavioral task
behavioral1
Sample
f32b2b73a11e9e6d3cae3366a3c366c931ab0c6aec2582df957aa34baa30b39c.exe
Resource
win7-20240221-en
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Targets
-
-
Target
f32b2b73a11e9e6d3cae3366a3c366c931ab0c6aec2582df957aa34baa30b39c
-
Size
1.8MB
-
MD5
c368875997d5bbb3402dc69dff22945b
-
SHA1
5f6aa2c23d066a04c2170fe75cf9095111689a25
-
SHA256
f32b2b73a11e9e6d3cae3366a3c366c931ab0c6aec2582df957aa34baa30b39c
-
SHA512
6eebb8de7121090c204200df2e601d0cc33851f82466ff5da0bbb4fd83c4baf473b445d362a4743b4eb50ec6a3928177c3bcb7a653ecc5fae77794da547d3960
-
SSDEEP
49152:pj7rhEr7TseSdfkMSPpH3WHKLhTGCn+DSA4:pqrXtGspxGQ+DSA
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-