General
-
Target
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed
-
Size
1.8MB
-
Sample
240926-2fzkxatgmg
-
MD5
bd7abe8f2f298b19d4a91f3ac05d96ac
-
SHA1
0a2560343a2f6d28008e409ede3050faff272058
-
SHA256
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed
-
SHA512
4a0fbecbd0098a81724fcb9e930b1256c0b218898c557883572f6c64954932c3479a0b384564ef72e027c425dc4eda0cdbd7abc857025795055d0c9d1c38c09a
-
SSDEEP
49152:wVXX1Qtyb/1DB8DXFu4zQghNPeE8melL:KZB87FuBgORmeN
Static task
static1
Behavioral task
behavioral1
Sample
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe
Resource
win10-20240611-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed
-
Size
1.8MB
-
MD5
bd7abe8f2f298b19d4a91f3ac05d96ac
-
SHA1
0a2560343a2f6d28008e409ede3050faff272058
-
SHA256
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed
-
SHA512
4a0fbecbd0098a81724fcb9e930b1256c0b218898c557883572f6c64954932c3479a0b384564ef72e027c425dc4eda0cdbd7abc857025795055d0c9d1c38c09a
-
SSDEEP
49152:wVXX1Qtyb/1DB8DXFu4zQghNPeE8melL:KZB87FuBgORmeN
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Discovery
Browser Information Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2