General
-
Target
b340589d2a73f0f1a82011eb939d68f505a6f1d78317a225ecaedd9efc74fa5c
-
Size
3.1MB
-
Sample
241226-x4z45awkev
-
MD5
1e40b93f43cbf3e851954515cb8f7af7
-
SHA1
3decb402d2fefe34fd95f5bae29deb961f064adf
-
SHA256
b340589d2a73f0f1a82011eb939d68f505a6f1d78317a225ecaedd9efc74fa5c
-
SHA512
b9943ff59bea72f37a0b13b37b9cd22242f8263ca816d24ccf8a3422772857ad7f4b12b4f30a7a090dd58c02d100d64b11ebfc68793eadcbf91e0c6ceb79410c
-
SSDEEP
49152:Sh1dEHOv+SRCrLcbnMnqh4QhNBivUCC9MJr5AJe:TYbnMnqWQ7BivUhSJrmJe
Static task
static1
Behavioral task
behavioral1
Sample
b340589d2a73f0f1a82011eb939d68f505a6f1d78317a225ecaedd9efc74fa5c.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
b340589d2a73f0f1a82011eb939d68f505a6f1d78317a225ecaedd9efc74fa5c
-
Size
3.1MB
-
MD5
1e40b93f43cbf3e851954515cb8f7af7
-
SHA1
3decb402d2fefe34fd95f5bae29deb961f064adf
-
SHA256
b340589d2a73f0f1a82011eb939d68f505a6f1d78317a225ecaedd9efc74fa5c
-
SHA512
b9943ff59bea72f37a0b13b37b9cd22242f8263ca816d24ccf8a3422772857ad7f4b12b4f30a7a090dd58c02d100d64b11ebfc68793eadcbf91e0c6ceb79410c
-
SSDEEP
49152:Sh1dEHOv+SRCrLcbnMnqh4QhNBivUCC9MJr5AJe:TYbnMnqWQ7BivUhSJrmJe
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-