General
-
Target
270f8ea1d4b8d58a411ba5724b64f104ad334015811b27f0ce149a8018b0c522.exe
-
Size
1.1MB
-
Sample
241217-ctcwmaylbp
-
MD5
1bb5abf7ea180a98cfada20d0ab2ef8a
-
SHA1
1b56deda01cccd0b87e101c862a7837072d3c341
-
SHA256
270f8ea1d4b8d58a411ba5724b64f104ad334015811b27f0ce149a8018b0c522
-
SHA512
4a51aecf67a8d33878dc453a3dbeb86a2e4fb8526a5210b96cdca1941f3618525eea7137a3dcf526e7c7c80ef517884a08b88f94ada8f686aafd1bdd8b572f4a
-
SSDEEP
24576:uYHZ4lEg7JeKj/2kmII3C88IQtuo/P5dON9Ensqq8gEn2T:uYUMQ+PIGC88IQtuY0ysqq8g
Static task
static1
Behavioral task
behavioral1
Sample
270f8ea1d4b8d58a411ba5724b64f104ad334015811b27f0ce149a8018b0c522.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
270f8ea1d4b8d58a411ba5724b64f104ad334015811b27f0ce149a8018b0c522.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
amadey
5.04
b44aeb
-
install_dir
7725ce688f
-
install_file
Gxtuum.exe
-
strings_key
8bf9b3f72bb53c678e0173edf42df1ae
-
url_paths
/3ofn3jf3e2ljk/index.php
Targets
-
-
Target
270f8ea1d4b8d58a411ba5724b64f104ad334015811b27f0ce149a8018b0c522.exe
-
Size
1.1MB
-
MD5
1bb5abf7ea180a98cfada20d0ab2ef8a
-
SHA1
1b56deda01cccd0b87e101c862a7837072d3c341
-
SHA256
270f8ea1d4b8d58a411ba5724b64f104ad334015811b27f0ce149a8018b0c522
-
SHA512
4a51aecf67a8d33878dc453a3dbeb86a2e4fb8526a5210b96cdca1941f3618525eea7137a3dcf526e7c7c80ef517884a08b88f94ada8f686aafd1bdd8b572f4a
-
SSDEEP
24576:uYHZ4lEg7JeKj/2kmII3C88IQtuo/P5dON9Ensqq8gEn2T:uYUMQ+PIGC88IQtuY0ysqq8g
Score10/10-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-