General
-
Target
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a
-
Size
3.6MB
-
Sample
241208-y86m5stnev
-
MD5
3bc888b63247898f10e270e0711ccca2
-
SHA1
342efb0b96606ddbe130fb362c24aa1661a72f33
-
SHA256
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a
-
SHA512
0684c613bbbef78ccd2c127e305ad9115a4623e8a3617a1a2d88c925725fb1817674f7f5b9c5394e60759c655660a5723f8a07d80bd369e5951970e1b3d5f5a1
-
SSDEEP
98304:b5TOfP9BOxle7zesk/WLKmLNi4ZBjUYnFVzkBhOZOAj/P:YQlEesaJmLNFPj9r4uOOP
Static task
static1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
quasar
1.4.1
Office04
45.200.148.155:6060
4b3820e0-d123-49d9-b51e-3c4daa4f6874
-
encryption_key
F8879E9B26846C57C99B6F152F74703E1CC15B8B
-
install_name
SecurityHealthSystray.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SecurityHealthSystray.exe
-
subdirectory
SubDir
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Targets
-
-
Target
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a
-
Size
3.6MB
-
MD5
3bc888b63247898f10e270e0711ccca2
-
SHA1
342efb0b96606ddbe130fb362c24aa1661a72f33
-
SHA256
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a
-
SHA512
0684c613bbbef78ccd2c127e305ad9115a4623e8a3617a1a2d88c925725fb1817674f7f5b9c5394e60759c655660a5723f8a07d80bd369e5951970e1b3d5f5a1
-
SSDEEP
98304:b5TOfP9BOxle7zesk/WLKmLNi4ZBjUYnFVzkBhOZOAj/P:YQlEesaJmLNFPj9r4uOOP
-
Amadey family
-
Lumma family
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1