General
-
Target
c7dc30fd00d20a180d493199f3c2a8c5d110cde829f8f683faae07f7583648bc
-
Size
1.7MB
-
Sample
240522-dlaa7sac53
-
MD5
89be485181f962da57cb671384f7877c
-
SHA1
b36934e6a863937d9fd3996b36e07ae89bae3576
-
SHA256
c7dc30fd00d20a180d493199f3c2a8c5d110cde829f8f683faae07f7583648bc
-
SHA512
fb1da6491fd80d93f2e8cb344f9ed09ef2ce117da51c49e15a077a60b568123574b292d66ecdb0a3c876dd79fc6aec10c1996b84ac0a2190a8423c456c30b105
-
SSDEEP
24576:J5kyJj3YU+DzFcTJ28y1JmX3s5I1t+5eCuVCyrZnKt9T1VNsF3wKtwtBB5cVZd4B:EyUUuIJgCc50zIAZQ95HsawrVVnTdm
Behavioral task
behavioral1
Sample
c7dc30fd00d20a180d493199f3c2a8c5d110cde829f8f683faae07f7583648bc.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Targets
-
-
Target
c7dc30fd00d20a180d493199f3c2a8c5d110cde829f8f683faae07f7583648bc
-
Size
1.7MB
-
MD5
89be485181f962da57cb671384f7877c
-
SHA1
b36934e6a863937d9fd3996b36e07ae89bae3576
-
SHA256
c7dc30fd00d20a180d493199f3c2a8c5d110cde829f8f683faae07f7583648bc
-
SHA512
fb1da6491fd80d93f2e8cb344f9ed09ef2ce117da51c49e15a077a60b568123574b292d66ecdb0a3c876dd79fc6aec10c1996b84ac0a2190a8423c456c30b105
-
SSDEEP
24576:J5kyJj3YU+DzFcTJ28y1JmX3s5I1t+5eCuVCyrZnKt9T1VNsF3wKtwtBB5cVZd4B:EyUUuIJgCc50zIAZQ95HsawrVVnTdm
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-