General
-
Target
0a99c76bf83db04806ed8885d825506a7a0fd57e73284a7620f0d32414f52187
-
Size
1.9MB
-
Sample
240702-tb3srszdrb
-
MD5
f4725cf3a9c819a354f92e948fd2b232
-
SHA1
00461514d81b209e3678cf018607a1e740dd4477
-
SHA256
0a99c76bf83db04806ed8885d825506a7a0fd57e73284a7620f0d32414f52187
-
SHA512
f5f9964981283f443b9cbc67ad2b36f431319a1936fd68e5151c6d49b6e09871acf89a8e8ce068495d7f7bf8eadafdcf3e886d06853d31540ab30f664b40521d
-
SSDEEP
49152:ZJJxMgkzxDh7ShkFtssfF3dw5c6S7UMMGW:1TkFPffFtsD
Static task
static1
Behavioral task
behavioral1
Sample
0a99c76bf83db04806ed8885d825506a7a0fd57e73284a7620f0d32414f52187.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Targets
-
-
Target
0a99c76bf83db04806ed8885d825506a7a0fd57e73284a7620f0d32414f52187
-
Size
1.9MB
-
MD5
f4725cf3a9c819a354f92e948fd2b232
-
SHA1
00461514d81b209e3678cf018607a1e740dd4477
-
SHA256
0a99c76bf83db04806ed8885d825506a7a0fd57e73284a7620f0d32414f52187
-
SHA512
f5f9964981283f443b9cbc67ad2b36f431319a1936fd68e5151c6d49b6e09871acf89a8e8ce068495d7f7bf8eadafdcf3e886d06853d31540ab30f664b40521d
-
SSDEEP
49152:ZJJxMgkzxDh7ShkFtssfF3dw5c6S7UMMGW:1TkFPffFtsD
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-