General
-
Target
7558d4c671c78fca6c733bf0d9fa024f7475b7b2adac3428936afb60adcda5a9
-
Size
1.8MB
-
Sample
240428-lh4dwacf89
-
MD5
ee5555f265f96fbeca410492e642da0c
-
SHA1
20066c2c05d8054ef14017bf4c3d18fb10df1b36
-
SHA256
7558d4c671c78fca6c733bf0d9fa024f7475b7b2adac3428936afb60adcda5a9
-
SHA512
b3ed18e4b0d848516fc6d31cac2506c47b0ee8c8cc95d230d70b05f6e7cf46960ee9ec36e36a3ba0e0500e0f8e1cdc31e1661db7705c960b091d55f732eb4933
-
SSDEEP
49152:k3/bnEXUO1UTIQGYjtCpFCYoHFYxlfAiHC9uHts+:kjnEr1UEJYjmFC/SPr3Hts+
Static task
static1
Behavioral task
behavioral1
Sample
7558d4c671c78fca6c733bf0d9fa024f7475b7b2adac3428936afb60adcda5a9.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Targets
-
-
Target
7558d4c671c78fca6c733bf0d9fa024f7475b7b2adac3428936afb60adcda5a9
-
Size
1.8MB
-
MD5
ee5555f265f96fbeca410492e642da0c
-
SHA1
20066c2c05d8054ef14017bf4c3d18fb10df1b36
-
SHA256
7558d4c671c78fca6c733bf0d9fa024f7475b7b2adac3428936afb60adcda5a9
-
SHA512
b3ed18e4b0d848516fc6d31cac2506c47b0ee8c8cc95d230d70b05f6e7cf46960ee9ec36e36a3ba0e0500e0f8e1cdc31e1661db7705c960b091d55f732eb4933
-
SSDEEP
49152:k3/bnEXUO1UTIQGYjtCpFCYoHFYxlfAiHC9uHts+:kjnEr1UEJYjmFC/SPr3Hts+
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-