General
-
Target
5e8e53a288d3b2bdb62d3b814bfb6820734ab51f5434f58a24574019576219c4
-
Size
1.8MB
-
Sample
240822-khevvaxcqb
-
MD5
9d3364d62f42901f8db4451155eb03d2
-
SHA1
89c1980d79c4c256637af56c88131677092f5ffe
-
SHA256
5e8e53a288d3b2bdb62d3b814bfb6820734ab51f5434f58a24574019576219c4
-
SHA512
040b549ddaf854310671efcbc3a3e8cb47077a574e43f32de86c27b34677e35d9d762fb666ca18f29e66c1bf7debd366e5fb873f37131691faca4e5d48016837
-
SSDEEP
49152:/wPREzUxuUBL6P7nZ+Th+FVn8Gzk7Cnr5arsPFvY90Vt8fX5eL:MFxuU56jZ+ThCUOnrYsy90X8v4L
Static task
static1
Behavioral task
behavioral1
Sample
a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe
Resource
win7-20240704-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Targets
-
-
Target
a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544.exe
-
Size
1.8MB
-
MD5
fbb7e8266d0875b81f294136bb93f90a
-
SHA1
88096781cb97d1fb0aab5ea5c59501eeebd06c52
-
SHA256
a61dc154af80d7c67638c50ca91d567ba0f872562c1b6c616e58abdda3bc3544
-
SHA512
1d86f4d357daf13b50c08f111fc58126674fe452ee09be4e7ecec23a65e3576e069929c90605a6abebfbcc3755881b76ae0a6112b9ad66fef3d6c6db3b338e28
-
SSDEEP
49152:6j1W65FNCu4RC+ResbXIYa/FOv/w/uxdvzNdTIss2/6ODKs:6ldCu2rgsbXC/FOgGxH7s21t
-
PureLog Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-