General
-
Target
282d39c4e359f69b5f4d9ffef2ae9686b841c33fe188faddf3843d84b4178cb4
-
Size
1.8MB
-
Sample
240623-sed35svfrh
-
MD5
8283d3bf4c491dde6f744e9ef5bc3274
-
SHA1
554115881ece7ecb07e12cbf5e789cf124064018
-
SHA256
282d39c4e359f69b5f4d9ffef2ae9686b841c33fe188faddf3843d84b4178cb4
-
SHA512
f2b0547e28864f9bcb4cb43cf27338d59ac40c7a909b8348255d7eebc79ad9b6bcb1b785ce06c88e5dbac4c4be3adbc0d4b4395c5b33c512ee0d844f4fcc7f11
-
SSDEEP
49152:IGxTqIz/sPpqoluKFY0ojzZoDkIbYuYnNtQQ:IqTqxpq0szZzEYN
Static task
static1
Behavioral task
behavioral1
Sample
282d39c4e359f69b5f4d9ffef2ae9686b841c33fe188faddf3843d84b4178cb4.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Targets
-
-
Target
282d39c4e359f69b5f4d9ffef2ae9686b841c33fe188faddf3843d84b4178cb4
-
Size
1.8MB
-
MD5
8283d3bf4c491dde6f744e9ef5bc3274
-
SHA1
554115881ece7ecb07e12cbf5e789cf124064018
-
SHA256
282d39c4e359f69b5f4d9ffef2ae9686b841c33fe188faddf3843d84b4178cb4
-
SHA512
f2b0547e28864f9bcb4cb43cf27338d59ac40c7a909b8348255d7eebc79ad9b6bcb1b785ce06c88e5dbac4c4be3adbc0d4b4395c5b33c512ee0d844f4fcc7f11
-
SSDEEP
49152:IGxTqIz/sPpqoluKFY0ojzZoDkIbYuYnNtQQ:IqTqxpq0szZzEYN
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-