General
-
Target
7124839bd57bfb958228c0b84ad7d1b48dbbde6731f350bffb62387cffc82dc4
-
Size
1.8MB
-
Sample
241226-yl534axmcq
-
MD5
5c2c6e3b951d69dec4e1827c238c2bdd
-
SHA1
e3526cfdef25e8907ac9d02dc943ff7092a21c7c
-
SHA256
7124839bd57bfb958228c0b84ad7d1b48dbbde6731f350bffb62387cffc82dc4
-
SHA512
561bbb7a222b3be95b86365ea6d7bd45264f2e3cba6f52f8d3189e0a9c84c28c1c59ac68891a3859e047c3592a1a1e92c5acfa31aa3882ddf294d3cb9d56371a
-
SSDEEP
49152:RLMRZRQTYIOgxE2aJrq6vBFuCyKMu8rbqjj:tMRZqOgxE2+rqtCZq
Static task
static1
Behavioral task
behavioral1
Sample
7124839bd57bfb958228c0b84ad7d1b48dbbde6731f350bffb62387cffc82dc4.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Targets
-
-
Target
7124839bd57bfb958228c0b84ad7d1b48dbbde6731f350bffb62387cffc82dc4
-
Size
1.8MB
-
MD5
5c2c6e3b951d69dec4e1827c238c2bdd
-
SHA1
e3526cfdef25e8907ac9d02dc943ff7092a21c7c
-
SHA256
7124839bd57bfb958228c0b84ad7d1b48dbbde6731f350bffb62387cffc82dc4
-
SHA512
561bbb7a222b3be95b86365ea6d7bd45264f2e3cba6f52f8d3189e0a9c84c28c1c59ac68891a3859e047c3592a1a1e92c5acfa31aa3882ddf294d3cb9d56371a
-
SSDEEP
49152:RLMRZRQTYIOgxE2aJrq6vBFuCyKMu8rbqjj:tMRZqOgxE2+rqtCZq
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-