General
-
Target
855b034a35e4ddc35bf081f63e499e6f89597934c1139e49b6ac43e53fc8d213
-
Size
1.7MB
-
Sample
240510-r5legaed68
-
MD5
58efcbdd47d43c6b3fa9e72bed855c91
-
SHA1
5cb1ec5c25b87a74f1b15e32a967e1302ac99dd2
-
SHA256
855b034a35e4ddc35bf081f63e499e6f89597934c1139e49b6ac43e53fc8d213
-
SHA512
9cbdff69cf0b6a469a16a79a56661b9d1f6d2f8c07c900f1c9e5f8a2e7cb9f651e5c0b084d4ba71de5af2f95dc815d93a29dc848cf313dd95b5ce2cabfd7c52b
-
SSDEEP
24576:O0pyEg2B7RVUUm4bcM0aUXJHblCtijIGNFI7V8Jo5Li76BzhPNO0qO4IM6VnCVt1:jpyEg27cIUXvCtMpN67V8OQa4InVns
Behavioral task
behavioral1
Sample
855b034a35e4ddc35bf081f63e499e6f89597934c1139e49b6ac43e53fc8d213.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Targets
-
-
Target
855b034a35e4ddc35bf081f63e499e6f89597934c1139e49b6ac43e53fc8d213
-
Size
1.7MB
-
MD5
58efcbdd47d43c6b3fa9e72bed855c91
-
SHA1
5cb1ec5c25b87a74f1b15e32a967e1302ac99dd2
-
SHA256
855b034a35e4ddc35bf081f63e499e6f89597934c1139e49b6ac43e53fc8d213
-
SHA512
9cbdff69cf0b6a469a16a79a56661b9d1f6d2f8c07c900f1c9e5f8a2e7cb9f651e5c0b084d4ba71de5af2f95dc815d93a29dc848cf313dd95b5ce2cabfd7c52b
-
SSDEEP
24576:O0pyEg2B7RVUUm4bcM0aUXJHblCtijIGNFI7V8Jo5Li76BzhPNO0qO4IM6VnCVt1:jpyEg27cIUXvCtMpN67V8OQa4InVns
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-