General
-
Target
c065ba22909fc8dbded4ea0eebb24ad5.exe
-
Size
1.0MB
-
Sample
241012-3zj51asfmr
-
MD5
c065ba22909fc8dbded4ea0eebb24ad5
-
SHA1
b3d61dd7519be3d2909be9ce2d28f65ec7f9965d
-
SHA256
9817f4d8bc1374f102196cfcb8a351abdc0563dea60f6084a7525e5ee5409b6d
-
SHA512
b8621a86897e0da506157225ef049e92e6c6bff9837e6e2a2b55328b6931e8bd484e57dba9d2fa532728a7e35a36918a1f699cc3a9af11d26ac1fbd4fce72814
-
SSDEEP
24576:vqJm/Xl+FIqBwq4QlGsljfzlE6J4zYfs6nScxy63:S4l+OqyLQHugVfDnS8y63
Static task
static1
Behavioral task
behavioral1
Sample
c065ba22909fc8dbded4ea0eebb24ad5.exe
Resource
win7-20241010-en
Malware Config
Extracted
amadey
4.42
550eb4
http://45.202.35.101
-
install_dir
9d94d7e7d6
-
install_file
Hkbsse.exe
-
strings_key
ff6ff15737aa82945cf5241d1644ddb4
-
url_paths
/pLQvfD4d/index.php
Targets
-
-
Target
c065ba22909fc8dbded4ea0eebb24ad5.exe
-
Size
1.0MB
-
MD5
c065ba22909fc8dbded4ea0eebb24ad5
-
SHA1
b3d61dd7519be3d2909be9ce2d28f65ec7f9965d
-
SHA256
9817f4d8bc1374f102196cfcb8a351abdc0563dea60f6084a7525e5ee5409b6d
-
SHA512
b8621a86897e0da506157225ef049e92e6c6bff9837e6e2a2b55328b6931e8bd484e57dba9d2fa532728a7e35a36918a1f699cc3a9af11d26ac1fbd4fce72814
-
SSDEEP
24576:vqJm/Xl+FIqBwq4QlGsljfzlE6J4zYfs6nScxy63:S4l+OqyLQHugVfDnS8y63
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1