General
-
Target
49b2e70aea9d43c385348559c535402849cc2d17f777491318e984a803952d9e
-
Size
1.6MB
-
Sample
240521-179phscb58
-
MD5
18b01b395414f9e1108aa08e0c12fc21
-
SHA1
b96c252cfff68e7a8af09b02770b44010584eb78
-
SHA256
49b2e70aea9d43c385348559c535402849cc2d17f777491318e984a803952d9e
-
SHA512
61a7855cc9cb9ecba8435d9c73d676ccbc6d3fb828c7b73fd7c696bf0d06f7fc8fe64188d54d87ffb35b16393b39ecf1f85596c811eb717e4b49aae8fbae0963
-
SSDEEP
49152:XlErwK1a3W4u1+ZA/WbBPlB8huaDa2nv+4PEknY:SrwKo3lu+yujIuaDaYPP3Y
Behavioral task
behavioral1
Sample
49b2e70aea9d43c385348559c535402849cc2d17f777491318e984a803952d9e.exe
Resource
win7-20231129-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Targets
-
-
Target
49b2e70aea9d43c385348559c535402849cc2d17f777491318e984a803952d9e
-
Size
1.6MB
-
MD5
18b01b395414f9e1108aa08e0c12fc21
-
SHA1
b96c252cfff68e7a8af09b02770b44010584eb78
-
SHA256
49b2e70aea9d43c385348559c535402849cc2d17f777491318e984a803952d9e
-
SHA512
61a7855cc9cb9ecba8435d9c73d676ccbc6d3fb828c7b73fd7c696bf0d06f7fc8fe64188d54d87ffb35b16393b39ecf1f85596c811eb717e4b49aae8fbae0963
-
SSDEEP
49152:XlErwK1a3W4u1+ZA/WbBPlB8huaDa2nv+4PEknY:SrwKo3lu+yujIuaDaYPP3Y
-
Detects executables packed with Themida
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-