General
-
Target
d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d
-
Size
6.8MB
-
Sample
241231-nqt7aaykht
-
MD5
8c92a0ca8c78ec66615177a1f2370085
-
SHA1
2b576ceea55fde405f86743fccd08588f3160d3d
-
SHA256
d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d
-
SHA512
c2cf1560474285deb529017ff1e688c5e7cb01497f9b06b61c4d3b092ea72f3722bda3ba4be50788446fbe9a7d4a5bb9734943917b25acd49a654d6813f82e71
-
SSDEEP
98304:0iFUwG+qBJOChC8L2oDv9GIex2V66vGtfqz0+UJMBXOEBcoX61Q5TENcB0ctK/6q:9zDqB0ChC8iIv9oyTnoDscoXKu3cJX
Static task
static1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d
-
Size
6.8MB
-
MD5
8c92a0ca8c78ec66615177a1f2370085
-
SHA1
2b576ceea55fde405f86743fccd08588f3160d3d
-
SHA256
d5d258f8d34f1350887547f09e34965f86315e3c445f1d1e0238a51e47be3a6d
-
SHA512
c2cf1560474285deb529017ff1e688c5e7cb01497f9b06b61c4d3b092ea72f3722bda3ba4be50788446fbe9a7d4a5bb9734943917b25acd49a654d6813f82e71
-
SSDEEP
98304:0iFUwG+qBJOChC8L2oDv9GIex2V66vGtfqz0+UJMBXOEBcoX61Q5TENcB0ctK/6q:9zDqB0ChC8iIv9oyTnoDscoXKu3cJX
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2