General
-
Target
105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9
-
Size
1.5MB
-
Sample
241213-wtcqeawrft
-
MD5
3b6864d7fd3baca4f3bcca0736c26617
-
SHA1
dbbbfa7e960b6d7e5b58494970f1acffc3b0cca6
-
SHA256
105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9
-
SHA512
69e0444f34c7cb13bed561bbd0d86e1896d31bce3c99308f01eda43d2caff99741bca9609f0a028b9135653999c98f86e19b91414ec5953ac327a695f2275b74
-
SSDEEP
24576:+EONo4rUDDLp8NrZTsB3+lTXEkiNu3Z7el9i7Sm6JO0EQuEtA7wMkW:+EOec6Pp4eBulTFiNuJSeSmyHEQuRLkW
Behavioral task
behavioral1
Sample
105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.20
3c5ff2
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Targets
-
-
Target
105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9
-
Size
1.5MB
-
MD5
3b6864d7fd3baca4f3bcca0736c26617
-
SHA1
dbbbfa7e960b6d7e5b58494970f1acffc3b0cca6
-
SHA256
105e328b76537631b6bf443a48dc288193db152a1ef25408373727aa1fc77fa9
-
SHA512
69e0444f34c7cb13bed561bbd0d86e1896d31bce3c99308f01eda43d2caff99741bca9609f0a028b9135653999c98f86e19b91414ec5953ac327a695f2275b74
-
SSDEEP
24576:+EONo4rUDDLp8NrZTsB3+lTXEkiNu3Z7el9i7Sm6JO0EQuEtA7wMkW:+EOec6Pp4eBulTFiNuJSeSmyHEQuRLkW
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-