General
-
Target
e5fb469fc3f4dbb4ba3848e468c2e203c858968804f7ef95f26d97529a129390
-
Size
1.8MB
-
Sample
240522-3h9z4adc75
-
MD5
7f2fb8e5d9098560ebcdd46e426b4a35
-
SHA1
c9194f022e28efc6d68e6c433638d17e9ca6a26a
-
SHA256
e5fb469fc3f4dbb4ba3848e468c2e203c858968804f7ef95f26d97529a129390
-
SHA512
0b9039a1dcc8291262b02e10b03bb2a5e30b2efd2690e264b638ac64108f17e17fc70f37b6aa752d7622d3664f5cbee2116ecaa32af409a88ce65803132fb380
-
SSDEEP
49152:/8YuB97L96YunVaEsgCoJsI7A8DOCgsl8IVqHe:MB9396jnVQ/Z85fVqHe
Behavioral task
behavioral1
Sample
e5fb469fc3f4dbb4ba3848e468c2e203c858968804f7ef95f26d97529a129390.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Targets
-
-
Target
e5fb469fc3f4dbb4ba3848e468c2e203c858968804f7ef95f26d97529a129390
-
Size
1.8MB
-
MD5
7f2fb8e5d9098560ebcdd46e426b4a35
-
SHA1
c9194f022e28efc6d68e6c433638d17e9ca6a26a
-
SHA256
e5fb469fc3f4dbb4ba3848e468c2e203c858968804f7ef95f26d97529a129390
-
SHA512
0b9039a1dcc8291262b02e10b03bb2a5e30b2efd2690e264b638ac64108f17e17fc70f37b6aa752d7622d3664f5cbee2116ecaa32af409a88ce65803132fb380
-
SSDEEP
49152:/8YuB97L96YunVaEsgCoJsI7A8DOCgsl8IVqHe:MB9396jnVQ/Z85fVqHe
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-