General
-
Target
12df5f413434f02531f88b0727b96ae8d4ed3c278fc81583dbfd4c0145b43e74.exe
-
Size
3.2MB
-
Sample
250108-ch7a4a1ncm
-
MD5
7638e458b00be1a00936ab9419267621
-
SHA1
af82d1c612dc47fb72a4798cbc42057bcc941602
-
SHA256
12df5f413434f02531f88b0727b96ae8d4ed3c278fc81583dbfd4c0145b43e74
-
SHA512
82bf4d2509a3763e63a5f066e59e401500253ad145f37b4f33d3bad20797fc77e09e97923085ef365d634e5396495269cf7aeb27da14b062ccb1283e0318877a
-
SSDEEP
49152:BTMxAHE1CwGlAyzR/Bl2fkYdE7u4oUkJrYWH4w7rsF:BBk1hGlAyzR/BwfkYdE64w4
Static task
static1
Behavioral task
behavioral1
Sample
12df5f413434f02531f88b0727b96ae8d4ed3c278fc81583dbfd4c0145b43e74.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
12df5f413434f02531f88b0727b96ae8d4ed3c278fc81583dbfd4c0145b43e74.exe
-
Size
3.2MB
-
MD5
7638e458b00be1a00936ab9419267621
-
SHA1
af82d1c612dc47fb72a4798cbc42057bcc941602
-
SHA256
12df5f413434f02531f88b0727b96ae8d4ed3c278fc81583dbfd4c0145b43e74
-
SHA512
82bf4d2509a3763e63a5f066e59e401500253ad145f37b4f33d3bad20797fc77e09e97923085ef365d634e5396495269cf7aeb27da14b062ccb1283e0318877a
-
SSDEEP
49152:BTMxAHE1CwGlAyzR/Bl2fkYdE7u4oUkJrYWH4w7rsF:BBk1hGlAyzR/BwfkYdE64w4
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-