General
-
Target
0925922fdbe39d656f15635e1475b3daccdcbe6aed4555e8dddba81b4e9cd9e5N.exe
-
Size
1.8MB
-
Sample
241118-f7qw7azbjb
-
MD5
1b76ce01a75d21a292f4c1385d625380
-
SHA1
40cea1325440d9c274e5c425216c9c6180172dcf
-
SHA256
0925922fdbe39d656f15635e1475b3daccdcbe6aed4555e8dddba81b4e9cd9e5
-
SHA512
8ebda3dd5a543c5fb7d1b7e408756f5db2b276f33af4df819e2ed8f3264efb8771d14143b7c8bb1ff0e4ea64159eb2010d9118308cf4fdd756357d07ea65e3f8
-
SSDEEP
49152:X6bTxx/XKRwms7jgJDV2QT3pp2ARtemRW8mVT+7f:XEd0rsv4DVN1pZRtemRKVT+7f
Static task
static1
Behavioral task
behavioral1
Sample
0925922fdbe39d656f15635e1475b3daccdcbe6aed4555e8dddba81b4e9cd9e5N.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
5.04
4bee07
http://185.215.113.209
-
install_dir
fc9e0aaab7
-
install_file
defnur.exe
-
strings_key
191655f008adc880f91bfc85bc56db54
-
url_paths
/Fru7Nk9/index.php
Targets
-
-
Target
0925922fdbe39d656f15635e1475b3daccdcbe6aed4555e8dddba81b4e9cd9e5N.exe
-
Size
1.8MB
-
MD5
1b76ce01a75d21a292f4c1385d625380
-
SHA1
40cea1325440d9c274e5c425216c9c6180172dcf
-
SHA256
0925922fdbe39d656f15635e1475b3daccdcbe6aed4555e8dddba81b4e9cd9e5
-
SHA512
8ebda3dd5a543c5fb7d1b7e408756f5db2b276f33af4df819e2ed8f3264efb8771d14143b7c8bb1ff0e4ea64159eb2010d9118308cf4fdd756357d07ea65e3f8
-
SSDEEP
49152:X6bTxx/XKRwms7jgJDV2QT3pp2ARtemRW8mVT+7f:XEd0rsv4DVN1pZRtemRKVT+7f
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1