General
-
Target
a32db65f898af65bee774d19c326c7e7b8ffc1c9e8726fdf310920e2114d1d6b
-
Size
1.8MB
-
Sample
241112-hd166sxcld
-
MD5
542a3f9fafad90ab42a2ff42268c72e4
-
SHA1
b2e59d80d83a2f230c4e9d246a649200dbf953c0
-
SHA256
a32db65f898af65bee774d19c326c7e7b8ffc1c9e8726fdf310920e2114d1d6b
-
SHA512
a059d864f08c4e44578ee229a227179b6d400fbcb7ddd27f3be3e09fa4584f0a04ebff4e69d0e5fbf2c49ee7bcb7b004e5d31f46e5fd44663c112233b91789be
-
SSDEEP
49152:gc74vs/ZNV1djphaG5AiY+HEej4wwi8t4TcsMF7/mRWU86yk:gcbZNV79haaAiYPej4wwi8uTcsMF7uM+
Static task
static1
Behavioral task
behavioral1
Sample
a32db65f898af65bee774d19c326c7e7b8ffc1c9e8726fdf310920e2114d1d6b.exe
Resource
win7-20241010-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Targets
-
-
Target
a32db65f898af65bee774d19c326c7e7b8ffc1c9e8726fdf310920e2114d1d6b
-
Size
1.8MB
-
MD5
542a3f9fafad90ab42a2ff42268c72e4
-
SHA1
b2e59d80d83a2f230c4e9d246a649200dbf953c0
-
SHA256
a32db65f898af65bee774d19c326c7e7b8ffc1c9e8726fdf310920e2114d1d6b
-
SHA512
a059d864f08c4e44578ee229a227179b6d400fbcb7ddd27f3be3e09fa4584f0a04ebff4e69d0e5fbf2c49ee7bcb7b004e5d31f46e5fd44663c112233b91789be
-
SSDEEP
49152:gc74vs/ZNV1djphaG5AiY+HEej4wwi8t4TcsMF7/mRWU86yk:gcbZNV79haaAiYPej4wwi8uTcsMF7uM+
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-