General
-
Target
e87659b8e46576271815dff623ad329ba00b2701fc42a4b631c4d70f42962a06
-
Size
2.8MB
-
Sample
241217-dctcqayjez
-
MD5
4151edefdf6c76d06b5d81845575876a
-
SHA1
93b891f61000a816830941eed9b7f1e7548e8815
-
SHA256
e87659b8e46576271815dff623ad329ba00b2701fc42a4b631c4d70f42962a06
-
SHA512
1ce20434ff9ded386dd74d06a938699ef2f1d1c7ff310989893b63d7d64c3f73d21ac65e14408c8c3a84c5df132632f30d6787e65f200e4bf327e3cb0d3479f3
-
SSDEEP
49152:6jHqiQyBFWr7HkXfuMWfxEN2dLJ276vqu14t6:6jKYB4r7EXfuZLdlc6vXI
Static task
static1
Behavioral task
behavioral1
Sample
e87659b8e46576271815dff623ad329ba00b2701fc42a4b631c4d70f42962a06.exe
Resource
win7-20241010-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Targets
-
-
Target
e87659b8e46576271815dff623ad329ba00b2701fc42a4b631c4d70f42962a06
-
Size
2.8MB
-
MD5
4151edefdf6c76d06b5d81845575876a
-
SHA1
93b891f61000a816830941eed9b7f1e7548e8815
-
SHA256
e87659b8e46576271815dff623ad329ba00b2701fc42a4b631c4d70f42962a06
-
SHA512
1ce20434ff9ded386dd74d06a938699ef2f1d1c7ff310989893b63d7d64c3f73d21ac65e14408c8c3a84c5df132632f30d6787e65f200e4bf327e3cb0d3479f3
-
SSDEEP
49152:6jHqiQyBFWr7HkXfuMWfxEN2dLJ276vqu14t6:6jKYB4r7EXfuZLdlc6vXI
-
Amadey family
-
Cryptbot family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-