General
-
Target
6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05
-
Size
1.7MB
-
Sample
240510-ltq8pafh6y
-
MD5
7bc3ca90ce9e0262f2feeb3ec0db93a7
-
SHA1
6032e4e1a49d26cab45b932f8a6e9ef8f0c2a7db
-
SHA256
6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05
-
SHA512
2f1813943a2ca91416930b903c5f23bde2a0c78d6c3b6f49d53bf96733c76edf1baf196237a5b311f0ec48660f1df823457f7544da7bf7e27ee6495510206b7d
-
SSDEEP
49152:aqLmpDKQnWFQbxq4/4FpWXsuUE17s+fk8:aNpORE46QC7rc8
Behavioral task
behavioral1
Sample
6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Targets
-
-
Target
6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05
-
Size
1.7MB
-
MD5
7bc3ca90ce9e0262f2feeb3ec0db93a7
-
SHA1
6032e4e1a49d26cab45b932f8a6e9ef8f0c2a7db
-
SHA256
6eba69890a2d2fb55e01d858de40e47920bb2fb9c36832e41e321b39a9ac4f05
-
SHA512
2f1813943a2ca91416930b903c5f23bde2a0c78d6c3b6f49d53bf96733c76edf1baf196237a5b311f0ec48660f1df823457f7544da7bf7e27ee6495510206b7d
-
SSDEEP
49152:aqLmpDKQnWFQbxq4/4FpWXsuUE17s+fk8:aNpORE46QC7rc8
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-