General
-
Target
595790a76db40955c13c19e13f0ff145c98b0cd5bdb3f61dc35207f95bce60c3
-
Size
1.8MB
-
Sample
240529-asazjaag2s
-
MD5
868224e45e2fff6a2b39023f367b0a9b
-
SHA1
3d0bd199c7e9e6fb08f2e195f3afc13abde902e4
-
SHA256
595790a76db40955c13c19e13f0ff145c98b0cd5bdb3f61dc35207f95bce60c3
-
SHA512
87ada1cadf4c6c15464c16e934f1e879c1e2aa3399f97d04bc045a7af5c0f6908012343a7f1a62516a384d7ed9ce9d26849141e37106704d59478a5426e7870f
-
SSDEEP
49152:eF2dKUpTSsUa13WZoHzRgTAFttVP/6ha9g:/nXWwaT8QIW
Static task
static1
Behavioral task
behavioral1
Sample
595790a76db40955c13c19e13f0ff145c98b0cd5bdb3f61dc35207f95bce60c3.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Targets
-
-
Target
595790a76db40955c13c19e13f0ff145c98b0cd5bdb3f61dc35207f95bce60c3
-
Size
1.8MB
-
MD5
868224e45e2fff6a2b39023f367b0a9b
-
SHA1
3d0bd199c7e9e6fb08f2e195f3afc13abde902e4
-
SHA256
595790a76db40955c13c19e13f0ff145c98b0cd5bdb3f61dc35207f95bce60c3
-
SHA512
87ada1cadf4c6c15464c16e934f1e879c1e2aa3399f97d04bc045a7af5c0f6908012343a7f1a62516a384d7ed9ce9d26849141e37106704d59478a5426e7870f
-
SSDEEP
49152:eF2dKUpTSsUa13WZoHzRgTAFttVP/6ha9g:/nXWwaT8QIW
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-