General
-
Target
a2082b155a75d3e93b273f49890631a2a574a34c6d69871b9c7e17208a5e4489.exe
-
Size
1.9MB
-
Sample
241010-nmlqqszgmk
-
MD5
a16b661f7b7872fbff91bdb5514481bc
-
SHA1
0c3ea21499b9cf621de8d31099ec2761c98b0dc2
-
SHA256
a2082b155a75d3e93b273f49890631a2a574a34c6d69871b9c7e17208a5e4489
-
SHA512
0cce8fb00864e3821cad65ab6e2c17475aa9cc03fa48447dc746da5022ae910e1fb3cd1223f217a43e41b7650329bcd53194a912bc89540a54a613eca3a4a25c
-
SSDEEP
49152:i6i0cBZvP4vg72F+lXF6LhIdgHtKSo4Vo:3TcBZvB6kGId2KSoUo
Static task
static1
Behavioral task
behavioral1
Sample
a2082b155a75d3e93b273f49890631a2a574a34c6d69871b9c7e17208a5e4489.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
lumma
https://clearancek.site
https://licendfilteo.site
https://spirittunek.store
https://bathdoomgaz.store
https://studennotediw.store
https://dissapoiznw.store
https://eaglepawnoy.store
https://mobbipenju.store
Targets
-
-
Target
a2082b155a75d3e93b273f49890631a2a574a34c6d69871b9c7e17208a5e4489.exe
-
Size
1.9MB
-
MD5
a16b661f7b7872fbff91bdb5514481bc
-
SHA1
0c3ea21499b9cf621de8d31099ec2761c98b0dc2
-
SHA256
a2082b155a75d3e93b273f49890631a2a574a34c6d69871b9c7e17208a5e4489
-
SHA512
0cce8fb00864e3821cad65ab6e2c17475aa9cc03fa48447dc746da5022ae910e1fb3cd1223f217a43e41b7650329bcd53194a912bc89540a54a613eca3a4a25c
-
SSDEEP
49152:i6i0cBZvP4vg72F+lXF6LhIdgHtKSo4Vo:3TcBZvB6kGId2KSoUo
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-