General
-
Target
36cde0f98ab8a93df2c3134ab9771502.bin
-
Size
1.8MB
-
Sample
241106-bgzzyssckb
-
MD5
0aa30cbfbc44c93468d97dc1444155b3
-
SHA1
ce0cc7a2292558f1c2917630789e52f4a9a15b6f
-
SHA256
44b9504b68e7e0ebf6eccfe23b89f8e6967585faedf375cbcd495da5dbcb87d2
-
SHA512
bdeae4ae4452c78730c8c70a647f441c94faa4774a3ff8aeb8ad208094fb48fd21a10f22df39c88563421ea9923aabddb0e86d39bd15a90221b40b887449c09f
-
SSDEEP
49152:RxMR7+7NV1pi5lzEiwtQqR880eX4kRAEN+LEJZQ3chB:RWV+7hpi5itQK8Z87yENFeqB
Static task
static1
Behavioral task
behavioral1
Sample
6d466d1d251413c12eea858fb6632f05321720d64212b98b92b68a7190627261.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Targets
-
-
Target
6d466d1d251413c12eea858fb6632f05321720d64212b98b92b68a7190627261.exe
-
Size
3.1MB
-
MD5
36cde0f98ab8a93df2c3134ab9771502
-
SHA1
d778b355d36d12d05562bed3f78af22c944eb575
-
SHA256
6d466d1d251413c12eea858fb6632f05321720d64212b98b92b68a7190627261
-
SHA512
a79ef6f322657769550e03f1734b88c1a3b330ec6523f5fa444066cea7bc1dfd2df41833d9c99380209f2e25d1685c81dbc9eee948aa30678ff8a54a3b4c5d80
-
SSDEEP
49152:og8DDIyU/xbvZJzwSmaOLxmeHpEeeJxs18eM9C:ogGDIyU/xbvXzwSmBtzHp8zs8eM9C
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1