General
-
Target
fa6aa0dd992228ace8364ddfe1df64c539ee82217fe36710e5882f62dc9868d7
-
Size
424KB
-
Sample
240620-3yz5tsxckm
-
MD5
993609639c915d36f2821bad869a17d4
-
SHA1
899988523cc0bde90c28889a5e32b273757915ac
-
SHA256
fa6aa0dd992228ace8364ddfe1df64c539ee82217fe36710e5882f62dc9868d7
-
SHA512
147b9272265b9a5edea8b1f54b37dd95e8380ba461233bb476612ff48016ae752b2cbfa31d3bf87a6f404469eae6c90392c652f19720b4531b78e648b7b58f32
-
SSDEEP
6144:6O1rkNbOFsBuztTfSoRgxX+j14TGYoij7aR1XPQg9TU5YGmvST3h68BoKupOdCHU:axBuBTExX+AoLzTUKdvST/BoKupOjHz
Behavioral task
behavioral1
Sample
fa6aa0dd992228ace8364ddfe1df64c539ee82217fe36710e5882f62dc9868d7.exe
Resource
win7-20240419-en
Malware Config
Extracted
amadey
4.30
94bf1c
http://185.172.128.116
-
install_dir
263c5c4d73
-
install_file
Hkbsse.exe
-
strings_key
70b7c8f26e3bc561578bd326a2eadf5a
-
url_paths
/Mb3GvQs8/index.php
Extracted
amadey
4.21
b2c2c1
http://greendag.ru
-
install_dir
e221f72865
-
install_file
Dctooux.exe
-
strings_key
09a7af7983af08af50ea3f51a73065e9
-
url_paths
/forum/index.php
Targets
-
-
Target
fa6aa0dd992228ace8364ddfe1df64c539ee82217fe36710e5882f62dc9868d7
-
Size
424KB
-
MD5
993609639c915d36f2821bad869a17d4
-
SHA1
899988523cc0bde90c28889a5e32b273757915ac
-
SHA256
fa6aa0dd992228ace8364ddfe1df64c539ee82217fe36710e5882f62dc9868d7
-
SHA512
147b9272265b9a5edea8b1f54b37dd95e8380ba461233bb476612ff48016ae752b2cbfa31d3bf87a6f404469eae6c90392c652f19720b4531b78e648b7b58f32
-
SSDEEP
6144:6O1rkNbOFsBuztTfSoRgxX+j14TGYoij7aR1XPQg9TU5YGmvST3h68BoKupOdCHU:axBuBTExX+AoLzTUKdvST/BoKupOjHz
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-