General
-
Target
863f6e719058feed00201f407e1b5a7d7d26e3d912670078583bb4e9d320bed3.exe
-
Size
1.8MB
-
Sample
241121-y59kma1ngp
-
MD5
b647137c15b5964746d800f149c771ba
-
SHA1
56cf6a851d0e4fdb5bba59365b7bb9ca7875e0ea
-
SHA256
863f6e719058feed00201f407e1b5a7d7d26e3d912670078583bb4e9d320bed3
-
SHA512
db9e3ba8d7f0468727edabd3b7ffd731c5c92ef5c6ad028c43b94475329b50d12b0c4f30ec0f46fb703543803b8c96d47150854888df11b43efa4d3c0f3a50ff
-
SSDEEP
49152:oFBSXMHHF5rlTSZc4Zc5rPXnoCJImdAFqyAZ0U:oFBSXMFdlT1iwrPXnRImdKpW0U
Static task
static1
Behavioral task
behavioral1
Sample
863f6e719058feed00201f407e1b5a7d7d26e3d912670078583bb4e9d320bed3.exe
Resource
win7-20241010-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/Windows-Update
Extracted
http://176.113.115.178/FF/1.png
Targets
-
-
Target
863f6e719058feed00201f407e1b5a7d7d26e3d912670078583bb4e9d320bed3.exe
-
Size
1.8MB
-
MD5
b647137c15b5964746d800f149c771ba
-
SHA1
56cf6a851d0e4fdb5bba59365b7bb9ca7875e0ea
-
SHA256
863f6e719058feed00201f407e1b5a7d7d26e3d912670078583bb4e9d320bed3
-
SHA512
db9e3ba8d7f0468727edabd3b7ffd731c5c92ef5c6ad028c43b94475329b50d12b0c4f30ec0f46fb703543803b8c96d47150854888df11b43efa4d3c0f3a50ff
-
SSDEEP
49152:oFBSXMHHF5rlTSZc4Zc5rPXnoCJImdAFqyAZ0U:oFBSXMFdlT1iwrPXnRImdKpW0U
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Virtualization/Sandbox Evasion
2