General
-
Target
ca528930aad08657fd84887928da7626b99ccbd4b1a5111e42d00d8d8513d93b
-
Size
1.8MB
-
Sample
240625-l3hmxawenm
-
MD5
b6e930e692e05b5903e7b91240d5b53d
-
SHA1
8395b37fd8da9eb9c4f2ea7283c197dd8c646caa
-
SHA256
ca528930aad08657fd84887928da7626b99ccbd4b1a5111e42d00d8d8513d93b
-
SHA512
47776ef7314c6c0c15ad38a1bc512021c961746bc8dbb31f87d98e077687c12710ef3e96edc3494f3e8981e0bd4cb728dafc40baba5be9eb6fbffcdffacfea1f
-
SSDEEP
49152:o1u1wtcSGAssdJAnf1gQxnmQ6E24nVdojiTfMr:o1c3AsgJCfZmlP4PrTfO
Static task
static1
Behavioral task
behavioral1
Sample
ca528930aad08657fd84887928da7626b99ccbd4b1a5111e42d00d8d8513d93b.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Targets
-
-
Target
ca528930aad08657fd84887928da7626b99ccbd4b1a5111e42d00d8d8513d93b
-
Size
1.8MB
-
MD5
b6e930e692e05b5903e7b91240d5b53d
-
SHA1
8395b37fd8da9eb9c4f2ea7283c197dd8c646caa
-
SHA256
ca528930aad08657fd84887928da7626b99ccbd4b1a5111e42d00d8d8513d93b
-
SHA512
47776ef7314c6c0c15ad38a1bc512021c961746bc8dbb31f87d98e077687c12710ef3e96edc3494f3e8981e0bd4cb728dafc40baba5be9eb6fbffcdffacfea1f
-
SSDEEP
49152:o1u1wtcSGAssdJAnf1gQxnmQ6E24nVdojiTfMr:o1c3AsgJCfZmlP4PrTfO
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-