General
-
Target
b3948404b310152184d179dd6900220956e90bdaa72a3594be14ab7922fa2a97
-
Size
1.8MB
-
Sample
240429-fyy67sbe49
-
MD5
2a7e3c27faad932683e24bcfe6cc0fd3
-
SHA1
85bb29b42155b72527e3c43a03ef2048658e549c
-
SHA256
b3948404b310152184d179dd6900220956e90bdaa72a3594be14ab7922fa2a97
-
SHA512
5970dfcbddadb0f365bf841c5e870a8a27cc82f5f59ee6785bb41549eff174bf9a1fbe0290561f872ea077d7c96919ab7a3c7cbe1884d2962873173d2ebc57b1
-
SSDEEP
49152:cf7E38DjrubmrC57Q+Xsg4+bYKneBq6eOXSL9ePl:cDE3Gruq+57t8g4MYOsqhOa9Yl
Static task
static1
Behavioral task
behavioral1
Sample
b3948404b310152184d179dd6900220956e90bdaa72a3594be14ab7922fa2a97.exe
Resource
win7-20240419-en
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Targets
-
-
Target
b3948404b310152184d179dd6900220956e90bdaa72a3594be14ab7922fa2a97
-
Size
1.8MB
-
MD5
2a7e3c27faad932683e24bcfe6cc0fd3
-
SHA1
85bb29b42155b72527e3c43a03ef2048658e549c
-
SHA256
b3948404b310152184d179dd6900220956e90bdaa72a3594be14ab7922fa2a97
-
SHA512
5970dfcbddadb0f365bf841c5e870a8a27cc82f5f59ee6785bb41549eff174bf9a1fbe0290561f872ea077d7c96919ab7a3c7cbe1884d2962873173d2ebc57b1
-
SSDEEP
49152:cf7E38DjrubmrC57Q+Xsg4+bYKneBq6eOXSL9ePl:cDE3Gruq+57t8g4MYOsqhOa9Yl
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-