General
-
Target
f51fca8f5c49c9e919e972f463a05d1d48d2dd706113e93ac53bdb67d0fc8192.exe
-
Size
3.1MB
-
Sample
250108-lce44awnbp
-
MD5
14b98ca2bd57893826cfe3a5acb4e040
-
SHA1
4a181fc3c0125862b23af66ae6444a889b3157f4
-
SHA256
f51fca8f5c49c9e919e972f463a05d1d48d2dd706113e93ac53bdb67d0fc8192
-
SHA512
22e12534b0a1d880915088600b5b3dd9139c345e93e901b14f27ed978599d3b4ffc40a50d115840fd3b88eb3ab5a759b3088e1ca0197e0fb02842d958482ace8
-
SSDEEP
49152:Owi0YfrlBkXVeJ3v2gSHjrrhlwKwaRPvwn1Z0pMX1POjbTp11ej:Q0Y7kXVehufHnEVadwn1p1PO1nw
Static task
static1
Behavioral task
behavioral1
Sample
f51fca8f5c49c9e919e972f463a05d1d48d2dd706113e93ac53bdb67d0fc8192.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Targets
-
-
Target
f51fca8f5c49c9e919e972f463a05d1d48d2dd706113e93ac53bdb67d0fc8192.exe
-
Size
3.1MB
-
MD5
14b98ca2bd57893826cfe3a5acb4e040
-
SHA1
4a181fc3c0125862b23af66ae6444a889b3157f4
-
SHA256
f51fca8f5c49c9e919e972f463a05d1d48d2dd706113e93ac53bdb67d0fc8192
-
SHA512
22e12534b0a1d880915088600b5b3dd9139c345e93e901b14f27ed978599d3b4ffc40a50d115840fd3b88eb3ab5a759b3088e1ca0197e0fb02842d958482ace8
-
SSDEEP
49152:Owi0YfrlBkXVeJ3v2gSHjrrhlwKwaRPvwn1Z0pMX1POjbTp11ej:Q0Y7kXVehufHnEVadwn1p1PO1nw
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-