General
-
Target
58ceac5179a2a39101c8ba12e1aa127c9ed2d2af43689aba79bffaa4ae9d9386
-
Size
1.7MB
-
Sample
240521-wwxtcsdh8s
-
MD5
6f04242fe608629caa797126e1a1f06c
-
SHA1
67dc1e8443603737bfd38b8ede17cfed8a06f4ab
-
SHA256
58ceac5179a2a39101c8ba12e1aa127c9ed2d2af43689aba79bffaa4ae9d9386
-
SHA512
20495db67dc5f6a25f1dd02f58e49750e4ac55fed4162e1f81dbb54b7769efa21ee93f293f194319880a829142bbb758431f39169edd6306b0c409b7e67ae378
-
SSDEEP
49152:Vk6ZoTERvptZRpvzApRHLwdoOuVtMNQG+UL2WwKlfRpun:agAElfrFzApK+OWfULBffRpun
Behavioral task
behavioral1
Sample
58ceac5179a2a39101c8ba12e1aa127c9ed2d2af43689aba79bffaa4ae9d9386.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Targets
-
-
Target
58ceac5179a2a39101c8ba12e1aa127c9ed2d2af43689aba79bffaa4ae9d9386
-
Size
1.7MB
-
MD5
6f04242fe608629caa797126e1a1f06c
-
SHA1
67dc1e8443603737bfd38b8ede17cfed8a06f4ab
-
SHA256
58ceac5179a2a39101c8ba12e1aa127c9ed2d2af43689aba79bffaa4ae9d9386
-
SHA512
20495db67dc5f6a25f1dd02f58e49750e4ac55fed4162e1f81dbb54b7769efa21ee93f293f194319880a829142bbb758431f39169edd6306b0c409b7e67ae378
-
SSDEEP
49152:Vk6ZoTERvptZRpvzApRHLwdoOuVtMNQG+UL2WwKlfRpun:agAElfrFzApK+OWfULBffRpun
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-