General
-
Target
15c9280f9458de84c4b8534fa91219d4a78d54b90bdd4cab599bff29c4dc99c9
-
Size
1.9MB
-
Sample
240526-htr87sbf89
-
MD5
18f684e26b30434930a86699389d73a2
-
SHA1
be27ef9c6bf5107f5dfef23340d02f50382d09f8
-
SHA256
15c9280f9458de84c4b8534fa91219d4a78d54b90bdd4cab599bff29c4dc99c9
-
SHA512
6c7b61550617a84ca9535b08d810039b283d89108aa9ab478c0bb45c250a80f80d2635de87f892c0e7b3c82976c8f7c354d532f4aca861721e8b884720b3820b
-
SSDEEP
49152:lSkD5PPAxuoPif8SRTZITZpcIhiwS1BPwQ:lSeQxuYiUSETZpcIdSoQ
Static task
static1
Behavioral task
behavioral1
Sample
15c9280f9458de84c4b8534fa91219d4a78d54b90bdd4cab599bff29c4dc99c9.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Targets
-
-
Target
15c9280f9458de84c4b8534fa91219d4a78d54b90bdd4cab599bff29c4dc99c9
-
Size
1.9MB
-
MD5
18f684e26b30434930a86699389d73a2
-
SHA1
be27ef9c6bf5107f5dfef23340d02f50382d09f8
-
SHA256
15c9280f9458de84c4b8534fa91219d4a78d54b90bdd4cab599bff29c4dc99c9
-
SHA512
6c7b61550617a84ca9535b08d810039b283d89108aa9ab478c0bb45c250a80f80d2635de87f892c0e7b3c82976c8f7c354d532f4aca861721e8b884720b3820b
-
SSDEEP
49152:lSkD5PPAxuoPif8SRTZITZpcIhiwS1BPwQ:lSeQxuYiUSETZpcIdSoQ
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-