General
-
Target
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe
-
Size
3.1MB
-
Sample
241216-df71aa1jcx
-
MD5
83bc6873a7977706a187a72d43538370
-
SHA1
9f9f8cac87edcfb3f5c64ccbea4d9340efc0d798
-
SHA256
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4
-
SHA512
cb7172da9dc701ce3d14919af9003ae1f3b29fc22c60846f0886ea6ef445a04312f39e9c29782808d69121f754e904e6b6213ae3b72d18ceeef3569cb14c0965
-
SSDEEP
49152:Otub5iT64321IMNRt3piRD2Lr22P6gkX+h8g9HAvdD:OtuS64321IMHCCXPbkOegZch
Static task
static1
Behavioral task
behavioral1
Sample
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe
Resource
win7-20241010-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://shineugler.biz/api
Extracted
lumma
https://shineugler.biz/api
Targets
-
-
Target
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4N.exe
-
Size
3.1MB
-
MD5
83bc6873a7977706a187a72d43538370
-
SHA1
9f9f8cac87edcfb3f5c64ccbea4d9340efc0d798
-
SHA256
f5ae76b6007c9d3e965000adf8a8c4537481f432689ad6110ed71b0fad648cc4
-
SHA512
cb7172da9dc701ce3d14919af9003ae1f3b29fc22c60846f0886ea6ef445a04312f39e9c29782808d69121f754e904e6b6213ae3b72d18ceeef3569cb14c0965
-
SSDEEP
49152:Otub5iT64321IMNRt3piRD2Lr22P6gkX+h8g9HAvdD:OtuS64321IMHCCXPbkOegZch
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3