General
-
Target
b7dc5b4f4be3d2c4c76937c27442a68694b473d5ca110ffd13cf6268cd3737f8
-
Size
1.7MB
-
Sample
240509-tll8rsdf32
-
MD5
9caa94f8c83dffabcec5bbd3589f9862
-
SHA1
abc713e2bfe145046f4e5cb5bd20e47bd041a95c
-
SHA256
b7dc5b4f4be3d2c4c76937c27442a68694b473d5ca110ffd13cf6268cd3737f8
-
SHA512
a3e639f416178437a9f9c0ff474b2cbe440d42ef7a6fafd4315e3c145cf78816799a76247675892b6232a3e0841222424979637b7280d02678bdaa571fe2dfa9
-
SSDEEP
49152:JwmwgUTbxbs9MWYhHXNO6atXkbMPIncuoUf7fslR:Jw7bbxZWYhHXM4bM8cofbslR
Behavioral task
behavioral1
Sample
b7dc5b4f4be3d2c4c76937c27442a68694b473d5ca110ffd13cf6268cd3737f8.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Targets
-
-
Target
b7dc5b4f4be3d2c4c76937c27442a68694b473d5ca110ffd13cf6268cd3737f8
-
Size
1.7MB
-
MD5
9caa94f8c83dffabcec5bbd3589f9862
-
SHA1
abc713e2bfe145046f4e5cb5bd20e47bd041a95c
-
SHA256
b7dc5b4f4be3d2c4c76937c27442a68694b473d5ca110ffd13cf6268cd3737f8
-
SHA512
a3e639f416178437a9f9c0ff474b2cbe440d42ef7a6fafd4315e3c145cf78816799a76247675892b6232a3e0841222424979637b7280d02678bdaa571fe2dfa9
-
SSDEEP
49152:JwmwgUTbxbs9MWYhHXNO6atXkbMPIncuoUf7fslR:Jw7bbxZWYhHXM4bM8cofbslR
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-