General
-
Target
752b0bfeaf55f0a8df7470384e252b4f31692c2a30b184c73f2f14b86f875042
-
Size
1.5MB
-
Sample
240509-gsljlage56
-
MD5
0376c95769929ffb66bad255777dec8d
-
SHA1
4ce7b7db01016d7a6a151957ba31ba52bba846f4
-
SHA256
752b0bfeaf55f0a8df7470384e252b4f31692c2a30b184c73f2f14b86f875042
-
SHA512
e18239dbdfdec6656e5624212f06b6f1bff20f57f373a164813dfc7ac0cb132d30fd19d029106d939bec8cafa0d0f3ab74ffc581186c11f63955e58c577dbbb0
-
SSDEEP
24576:x+ZOQTe732fo6Ar6MpiOQlzd/3nvmgytE9IrywAkQDtZ6l1iM8SErFfP5t23QkIK:8jTlA2MxQJdvOJ69uSXR21iM8SErFfN+
Behavioral task
behavioral1
Sample
752b0bfeaf55f0a8df7470384e252b4f31692c2a30b184c73f2f14b86f875042.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Targets
-
-
Target
752b0bfeaf55f0a8df7470384e252b4f31692c2a30b184c73f2f14b86f875042
-
Size
1.5MB
-
MD5
0376c95769929ffb66bad255777dec8d
-
SHA1
4ce7b7db01016d7a6a151957ba31ba52bba846f4
-
SHA256
752b0bfeaf55f0a8df7470384e252b4f31692c2a30b184c73f2f14b86f875042
-
SHA512
e18239dbdfdec6656e5624212f06b6f1bff20f57f373a164813dfc7ac0cb132d30fd19d029106d939bec8cafa0d0f3ab74ffc581186c11f63955e58c577dbbb0
-
SSDEEP
24576:x+ZOQTe732fo6Ar6MpiOQlzd/3nvmgytE9IrywAkQDtZ6l1iM8SErFfP5t23QkIK:8jTlA2MxQJdvOJ69uSXR21iM8SErFfN+
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-