General
-
Target
c81aea2b27275a041a7138cf76bb4ededde13ae9a31269bda7643ef939699a26
-
Size
1.5MB
-
Sample
240521-e4qxcahf7s
-
MD5
a4ee2ff31d07e4a96485d5cdc8570b77
-
SHA1
52fe811b727a827e1d0dc3d05bbf843c853d6bc4
-
SHA256
c81aea2b27275a041a7138cf76bb4ededde13ae9a31269bda7643ef939699a26
-
SHA512
3b09d1afbab668b2b28290f8595f80b3db0414f6044fc802c972b69b6f552fedaa2451b976e9f8525d272e20f810e0cfa56622dcf11af43e5934b938fbcfa3e1
-
SSDEEP
49152:Dzc9GoN0yAXVYDwgra+PJ2Iq/TWkRCkkF2Qa:XzyAX6Dwk3ULRga
Behavioral task
behavioral1
Sample
c81aea2b27275a041a7138cf76bb4ededde13ae9a31269bda7643ef939699a26.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
amadey
4.20
c767c0
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Extracted
risepro
147.45.47.126:58709
Targets
-
-
Target
c81aea2b27275a041a7138cf76bb4ededde13ae9a31269bda7643ef939699a26
-
Size
1.5MB
-
MD5
a4ee2ff31d07e4a96485d5cdc8570b77
-
SHA1
52fe811b727a827e1d0dc3d05bbf843c853d6bc4
-
SHA256
c81aea2b27275a041a7138cf76bb4ededde13ae9a31269bda7643ef939699a26
-
SHA512
3b09d1afbab668b2b28290f8595f80b3db0414f6044fc802c972b69b6f552fedaa2451b976e9f8525d272e20f810e0cfa56622dcf11af43e5934b938fbcfa3e1
-
SSDEEP
49152:Dzc9GoN0yAXVYDwgra+PJ2Iq/TWkRCkkF2Qa:XzyAX6Dwk3ULRga
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-