General
-
Target
7a20b892f34c0fe93543770dbbe8b0cd5d79f0b384f3f52c2ca2fff4cc345e33
-
Size
1.9MB
-
Sample
240425-cs49gsdg61
-
MD5
c1468ad2da923df40ad53a24738c1963
-
SHA1
eeae4818902ad1c249f230094dbe83881ff7fcea
-
SHA256
7a20b892f34c0fe93543770dbbe8b0cd5d79f0b384f3f52c2ca2fff4cc345e33
-
SHA512
6dcfe2c5ede7e8452a4811248f0b5dc5df64bca1d62c5cdf81218174227307ac9c90a71e41effc54c1be21fffd4619fc66185e2b129e177de5e5ea1ebc5178f7
-
SSDEEP
49152:erc34xQXWLS4X36XzuMpLQCg/69vfCY1fpzl:yc34xFuQKXiMpLQCd66ph
Static task
static1
Behavioral task
behavioral1
Sample
7a20b892f34c0fe93543770dbbe8b0cd5d79f0b384f3f52c2ca2fff4cc345e33.exe
Resource
win7-20231129-en
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Targets
-
-
Target
7a20b892f34c0fe93543770dbbe8b0cd5d79f0b384f3f52c2ca2fff4cc345e33
-
Size
1.9MB
-
MD5
c1468ad2da923df40ad53a24738c1963
-
SHA1
eeae4818902ad1c249f230094dbe83881ff7fcea
-
SHA256
7a20b892f34c0fe93543770dbbe8b0cd5d79f0b384f3f52c2ca2fff4cc345e33
-
SHA512
6dcfe2c5ede7e8452a4811248f0b5dc5df64bca1d62c5cdf81218174227307ac9c90a71e41effc54c1be21fffd4619fc66185e2b129e177de5e5ea1ebc5178f7
-
SSDEEP
49152:erc34xQXWLS4X36XzuMpLQCg/69vfCY1fpzl:yc34xFuQKXiMpLQCd66ph
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-