General
-
Target
f7b1ae68995f7564723849e8c00f6eeb054316721049038177e5fbf7fd473305
-
Size
1.7MB
-
Sample
240520-3lg4gsbb78
-
MD5
78412b51f722a9287a33b9b2cf0fb3da
-
SHA1
ea81817341ed47ad8e582faedad37607e14f07c9
-
SHA256
f7b1ae68995f7564723849e8c00f6eeb054316721049038177e5fbf7fd473305
-
SHA512
94240dab206080783418d30c2eb3dc9de4a277dc65fd75d5fb9568cc1de567e6a9e8d9440a30a4763d72e526986ce9b6eea2c459b476baf78440846d1e2e79b0
-
SSDEEP
49152:iEqGRGnTxxYPGmY18VhK5o/MROnrXTRM67Mun1WWnda:n4nDYPZY18/ao/Lnrt7Mu1WQa
Behavioral task
behavioral1
Sample
f7b1ae68995f7564723849e8c00f6eeb054316721049038177e5fbf7fd473305.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Targets
-
-
Target
f7b1ae68995f7564723849e8c00f6eeb054316721049038177e5fbf7fd473305
-
Size
1.7MB
-
MD5
78412b51f722a9287a33b9b2cf0fb3da
-
SHA1
ea81817341ed47ad8e582faedad37607e14f07c9
-
SHA256
f7b1ae68995f7564723849e8c00f6eeb054316721049038177e5fbf7fd473305
-
SHA512
94240dab206080783418d30c2eb3dc9de4a277dc65fd75d5fb9568cc1de567e6a9e8d9440a30a4763d72e526986ce9b6eea2c459b476baf78440846d1e2e79b0
-
SSDEEP
49152:iEqGRGnTxxYPGmY18VhK5o/MROnrXTRM67Mun1WWnda:n4nDYPZY18/ao/Lnrt7Mu1WQa
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-