General
-
Target
ffe651949e62cd041dee9b18e715b27dc5faeb8a27a3096a8ee5d8344199f072
-
Size
1.8MB
-
Sample
241227-av7fhswngx
-
MD5
2fb6622fc2bfdf27e27c8bd33c2ba196
-
SHA1
96c0797818d02bc373fa96e8d42cae66e41d51a4
-
SHA256
ffe651949e62cd041dee9b18e715b27dc5faeb8a27a3096a8ee5d8344199f072
-
SHA512
bc68c80791e6380335c3741cc2001fd5fcb19d62aec9a618a979cb0b8e7671f428e60252814e4f9a1b41768f10afaec83419b720924a3add6bb04fa295d36cf4
-
SSDEEP
24576:R/fha8JVKPJI852wYgvNwhIYPX01CrYPB/4BSfQ/2Lor0h+1SHp863LZ74e8lV3Z:ZbI5egvDYPErPB/DLCSSsqecStWJ
Static task
static1
Behavioral task
behavioral1
Sample
ffe651949e62cd041dee9b18e715b27dc5faeb8a27a3096a8ee5d8344199f072.exe
Resource
win7-20241010-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Targets
-
-
Target
ffe651949e62cd041dee9b18e715b27dc5faeb8a27a3096a8ee5d8344199f072
-
Size
1.8MB
-
MD5
2fb6622fc2bfdf27e27c8bd33c2ba196
-
SHA1
96c0797818d02bc373fa96e8d42cae66e41d51a4
-
SHA256
ffe651949e62cd041dee9b18e715b27dc5faeb8a27a3096a8ee5d8344199f072
-
SHA512
bc68c80791e6380335c3741cc2001fd5fcb19d62aec9a618a979cb0b8e7671f428e60252814e4f9a1b41768f10afaec83419b720924a3add6bb04fa295d36cf4
-
SSDEEP
24576:R/fha8JVKPJI852wYgvNwhIYPX01CrYPB/4BSfQ/2Lor0h+1SHp863LZ74e8lV3Z:ZbI5egvDYPErPB/DLCSSsqecStWJ
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-