General
-
Target
f328ad82a28b8c18d8fa427992b38341a3022f34b81de984cf3268fd6539d3a8
-
Size
1.8MB
-
Sample
240518-yvfjssda71
-
MD5
0e8bc4e5761324bdac824550eff288d7
-
SHA1
434a119a13c4a75d0fa9ef7a880ae3ab6010db4f
-
SHA256
f328ad82a28b8c18d8fa427992b38341a3022f34b81de984cf3268fd6539d3a8
-
SHA512
7948105956f5fe34740b38441b74780d53d75157a9817bf0f92b2bc4ca9c24435ed8ecc8df3b33e6795cc048e446a61a7019b3914b302f7a45533401254d0d80
-
SSDEEP
49152:VLQpO4Sjn2tj+VhZm2bhUx2ze3FIkjMDIvr8:9hDVhZm0hLkloa8
Static task
static1
Behavioral task
behavioral1
Sample
f328ad82a28b8c18d8fa427992b38341a3022f34b81de984cf3268fd6539d3a8.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
4.20
c767c0
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Extracted
lumma
https://buttockdecarderwiso.shop/api
https://museumtespaceorsp.shop/api
https://averageaattractiionsl.shop/api
https://femininiespywageg.shop/api
https://employhabragaomlsp.shop/api
https://stalfbaclcalorieeis.shop/api
https://civilianurinedtsraov.shop/api
https://roomabolishsnifftwk.shop/api
Targets
-
-
Target
f328ad82a28b8c18d8fa427992b38341a3022f34b81de984cf3268fd6539d3a8
-
Size
1.8MB
-
MD5
0e8bc4e5761324bdac824550eff288d7
-
SHA1
434a119a13c4a75d0fa9ef7a880ae3ab6010db4f
-
SHA256
f328ad82a28b8c18d8fa427992b38341a3022f34b81de984cf3268fd6539d3a8
-
SHA512
7948105956f5fe34740b38441b74780d53d75157a9817bf0f92b2bc4ca9c24435ed8ecc8df3b33e6795cc048e446a61a7019b3914b302f7a45533401254d0d80
-
SSDEEP
49152:VLQpO4Sjn2tj+VhZm2bhUx2ze3FIkjMDIvr8:9hDVhZm0hLkloa8
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-