General
-
Target
8aaf33bf3190b72432e2722ee91838224edc4d5a44a683b521123f3ca38a66b8
-
Size
1.8MB
-
Sample
240625-2sasbaycre
-
MD5
4247dfedb0337ee7a1989504bece411f
-
SHA1
f540804fdfff649eedd31fbe48c1e64b1d767c80
-
SHA256
8aaf33bf3190b72432e2722ee91838224edc4d5a44a683b521123f3ca38a66b8
-
SHA512
261936a712958d46ad9cf7d11c68b9323d27910fee7408317ff98b0ec3ab3f12f31447786e91b8d3faf61ba95de79baf492fba2e8d421fe8af5a702901f17f6d
-
SSDEEP
49152:fBN0fAJHUSpf2Djv5Q4D/nuYCZMnbeSo:f0GHTZMV7nVECb
Static task
static1
Behavioral task
behavioral1
Sample
8aaf33bf3190b72432e2722ee91838224edc4d5a44a683b521123f3ca38a66b8.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Targets
-
-
Target
8aaf33bf3190b72432e2722ee91838224edc4d5a44a683b521123f3ca38a66b8
-
Size
1.8MB
-
MD5
4247dfedb0337ee7a1989504bece411f
-
SHA1
f540804fdfff649eedd31fbe48c1e64b1d767c80
-
SHA256
8aaf33bf3190b72432e2722ee91838224edc4d5a44a683b521123f3ca38a66b8
-
SHA512
261936a712958d46ad9cf7d11c68b9323d27910fee7408317ff98b0ec3ab3f12f31447786e91b8d3faf61ba95de79baf492fba2e8d421fe8af5a702901f17f6d
-
SSDEEP
49152:fBN0fAJHUSpf2Djv5Q4D/nuYCZMnbeSo:f0GHTZMV7nVECb
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-