General
-
Target
ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
-
Size
486KB
-
Sample
240616-145w6avblk
-
MD5
7e21139b2ee068b54e0a8c8a2ae2da55
-
SHA1
44519c4665d33143a19100cf9e2884a5d8c5677f
-
SHA256
ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
-
SHA512
b158bce9c6ff838f75bc515b9d6f3d4f953d293179cfd3c52c7b9b0bfa36499e22b1d87bd0694628fd0545809154f52fdd764b1a61c0caf9677644d8d2ca4285
-
SSDEEP
6144:XjxL1o4By2pmW51IAaXhpI/s+jK6IxxnEGkl5gfSVQj79lBsVg5wawy57AAV:XdtBfB51naRpn+u6Qbkj7079Ifm7
Static task
static1
Behavioral task
behavioral1
Sample
ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Targets
-
-
Target
ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
-
Size
486KB
-
MD5
7e21139b2ee068b54e0a8c8a2ae2da55
-
SHA1
44519c4665d33143a19100cf9e2884a5d8c5677f
-
SHA256
ada480a52b1b5b050f4186e0f6a7969fd7c951a3a9596f5a1824af11fb48b2e8
-
SHA512
b158bce9c6ff838f75bc515b9d6f3d4f953d293179cfd3c52c7b9b0bfa36499e22b1d87bd0694628fd0545809154f52fdd764b1a61c0caf9677644d8d2ca4285
-
SSDEEP
6144:XjxL1o4By2pmW51IAaXhpI/s+jK6IxxnEGkl5gfSVQj79lBsVg5wawy57AAV:XdtBfB51naRpn+u6Qbkj7079Ifm7
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-