General
-
Target
file.exe
-
Size
1.8MB
-
Sample
240926-ek72hszbjg
-
MD5
cb1a17efda5be9d8d7ce9fe5903812da
-
SHA1
d1b00bb0b02d27538eca9a2788f84e93cec9cf78
-
SHA256
d558e3e2afe0bbfa36ae7020c052e1a0077c45e172d643e8f0af0aa617c35875
-
SHA512
a000e40ddcc6033e1962d3528881268321bac6e6681ca98ec4c6cefd5f20d0d574ed2092dc8b14b9b7fbeceea0fc9de5b4649a17112fbaaa8c16f9d092368369
-
SSDEEP
24576:uIihqFaIBf8u8bU1OcKusr3KeFnd7EnMYvMV6/t6aGMsZ9QmrKSkYbQlj9CQX/6:uIZUu8cKfxZvY0s8VMCKwKQQCjD1Im
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
cb1a17efda5be9d8d7ce9fe5903812da
-
SHA1
d1b00bb0b02d27538eca9a2788f84e93cec9cf78
-
SHA256
d558e3e2afe0bbfa36ae7020c052e1a0077c45e172d643e8f0af0aa617c35875
-
SHA512
a000e40ddcc6033e1962d3528881268321bac6e6681ca98ec4c6cefd5f20d0d574ed2092dc8b14b9b7fbeceea0fc9de5b4649a17112fbaaa8c16f9d092368369
-
SSDEEP
24576:uIihqFaIBf8u8bU1OcKusr3KeFnd7EnMYvMV6/t6aGMsZ9QmrKSkYbQlj9CQX/6:uIZUu8cKfxZvY0s8VMCKwKQQCjD1Im
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-