General
-
Target
ec05a90b885f1c109c76ee81f0e67b0401ac2ebf65e60c3750604bfbe78849b6
-
Size
3.1MB
-
Sample
250105-a9zzzswjcx
-
MD5
00d7afcfd2a0d73e97bae5eb53759e20
-
SHA1
98709da0be5821ed926a91dbf150be86096dbd31
-
SHA256
ec05a90b885f1c109c76ee81f0e67b0401ac2ebf65e60c3750604bfbe78849b6
-
SHA512
cc5c642e9be05af13b7be6f0d7532b3d8f3c80f8cc07d2bd73546e59707d3127d6f0f5c4c6b40c21460f5fa01e5ce890af375474b59ee3aa61a1288445dcbbf2
-
SSDEEP
49152:Xzaozin2JQXMQ4utxrM2K20bZVel4fh15hefZnml:1in2JQXV4utZM2K20fel4515wfZml
Static task
static1
Behavioral task
behavioral1
Sample
ec05a90b885f1c109c76ee81f0e67b0401ac2ebf65e60c3750604bfbe78849b6.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
ec05a90b885f1c109c76ee81f0e67b0401ac2ebf65e60c3750604bfbe78849b6
-
Size
3.1MB
-
MD5
00d7afcfd2a0d73e97bae5eb53759e20
-
SHA1
98709da0be5821ed926a91dbf150be86096dbd31
-
SHA256
ec05a90b885f1c109c76ee81f0e67b0401ac2ebf65e60c3750604bfbe78849b6
-
SHA512
cc5c642e9be05af13b7be6f0d7532b3d8f3c80f8cc07d2bd73546e59707d3127d6f0f5c4c6b40c21460f5fa01e5ce890af375474b59ee3aa61a1288445dcbbf2
-
SSDEEP
49152:Xzaozin2JQXMQ4utxrM2K20bZVel4fh15hefZnml:1in2JQXV4utZM2K20fel4515wfZml
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-