General
-
Target
db04aa6e158c5d52c20fc855f5285905.bin
-
Size
1.3MB
-
Sample
241213-byrd5strd1
-
MD5
1a849c1d3b9e0a8922e0b06676219aa2
-
SHA1
593eba51b852fa371cff37bb8306febcda25a0f7
-
SHA256
fd0463cb1fa51a3826dd6bceae5b41f015ff42bd2c50beaf9677d7deb4e2d430
-
SHA512
8181b1354a5595e3c3a8d5b8cc32dc8719fe29d2e4846ef9d66a7c2474a2f6929f52662b9c9b85876d0e14afd7a894873b2bade8ab34662ea5e3d76c4b4509ea
-
SSDEEP
24576:gjCE3ZWqWJWMa1iwJTrzFL4z0PqxjduGVA34dE32EASb43W9lr8pU:gjCE3ZW4F1FlrN4zYqx4GVAt3RQW78pU
Static task
static1
Behavioral task
behavioral1
Sample
ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f.exe
Resource
win7-20241010-en
Malware Config
Extracted
amadey
4.18
1cc3fe
http://vitantgroup.com
-
install_dir
431a343abc
-
install_file
Dctooux.exe
-
strings_key
5a2387e2bfef84adb686c856b4155237
-
url_paths
/xmlrpc.php
Targets
-
-
Target
ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f.exe
-
Size
1.3MB
-
MD5
db04aa6e158c5d52c20fc855f5285905
-
SHA1
822416dfa3f094aa6776ed0cad77fb9083db29a3
-
SHA256
ced8891ea8d87005de989f25f0f94634d1fc70ebb37302cf21aa0c0b0e13350f
-
SHA512
cdc0ff46ac48178da0a68d4e2601a46a960c3aa998edd66a7bb6a39d1caa7dbbe53f1aa463307a9932996d2993386addc7c54cee73811897b075dd75fbc904ff
-
SSDEEP
24576:wbsh2BfGSklE31Sa1jnzi+k24VR5SLRUyvQAqBYcTHykVbFv4pOdfEPkXsvHo/s/:wbsQf6lEFti+kZRSUJAqB/VRsO/oo/sJ
-
Amadey family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-