General
-
Target
af831ecc875c10319fb1efc3eb3402b92a3080ce4f23b4afff10a9affe2f3385
-
Size
1.5MB
-
Sample
240524-besg4afe6x
-
MD5
41e9a74498e8bab48bf9dd0db4781e6e
-
SHA1
f2e93aebcac28571b587f637a48335e420088838
-
SHA256
af831ecc875c10319fb1efc3eb3402b92a3080ce4f23b4afff10a9affe2f3385
-
SHA512
ec156c738f5b20b6680d40b5643ab1ed9f8f21805b7a8243ea2e7dec389583a1fcafa2aa7b6e76d6dbf84fc3c98c07062adaf10cd8bdb797a1314081352e922a
-
SSDEEP
24576:O4Pak51k2lfniq40W/OWXLrPVEXwtmPT2T0f9yQsF10:O4p62l/iqI/OwdEAt42T0lzsU
Behavioral task
behavioral1
Sample
af831ecc875c10319fb1efc3eb3402b92a3080ce4f23b4afff10a9affe2f3385.exe
Resource
win7-20240221-en
Malware Config
Extracted
amadey
4.20
18befc
http://5.42.96.141
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Targets
-
-
Target
af831ecc875c10319fb1efc3eb3402b92a3080ce4f23b4afff10a9affe2f3385
-
Size
1.5MB
-
MD5
41e9a74498e8bab48bf9dd0db4781e6e
-
SHA1
f2e93aebcac28571b587f637a48335e420088838
-
SHA256
af831ecc875c10319fb1efc3eb3402b92a3080ce4f23b4afff10a9affe2f3385
-
SHA512
ec156c738f5b20b6680d40b5643ab1ed9f8f21805b7a8243ea2e7dec389583a1fcafa2aa7b6e76d6dbf84fc3c98c07062adaf10cd8bdb797a1314081352e922a
-
SSDEEP
24576:O4Pak51k2lfniq40W/OWXLrPVEXwtmPT2T0f9yQsF10:O4p62l/iqI/OwdEAt42T0lzsU
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-