General
-
Target
8cb7f5e015aae26e40664ddc5977e243455bd0d35346b227d2af8363d56c48a2.exe
-
Size
3.4MB
-
Sample
250112-qjlyfatma1
-
MD5
732a071df40c4526161c30cf57d394b6
-
SHA1
5e20e69ada9fa7ff5fb96a9294bc9091354ad132
-
SHA256
8cb7f5e015aae26e40664ddc5977e243455bd0d35346b227d2af8363d56c48a2
-
SHA512
e257b3809eab569f1c4bc616b9adfeced701f41b03114f2835c06d4a11c5c3820029d9a7a098150b683c164264d261cbe9b50f23b7a56a1bf1ebcdd08561a683
-
SSDEEP
49152:hlP3QmzIGudtUJXmZsW1bWbHgFMT1JM/eQdBReOPDSjJCaVIWGgooEXCdUx/rUXb:jQm5u3U50A1GdXeOP2jLdGgjOxIX9kSL
Static task
static1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
8cb7f5e015aae26e40664ddc5977e243455bd0d35346b227d2af8363d56c48a2.exe
-
Size
3.4MB
-
MD5
732a071df40c4526161c30cf57d394b6
-
SHA1
5e20e69ada9fa7ff5fb96a9294bc9091354ad132
-
SHA256
8cb7f5e015aae26e40664ddc5977e243455bd0d35346b227d2af8363d56c48a2
-
SHA512
e257b3809eab569f1c4bc616b9adfeced701f41b03114f2835c06d4a11c5c3820029d9a7a098150b683c164264d261cbe9b50f23b7a56a1bf1ebcdd08561a683
-
SSDEEP
49152:hlP3QmzIGudtUJXmZsW1bWbHgFMT1JM/eQdBReOPDSjJCaVIWGgooEXCdUx/rUXb:jQm5u3U50A1GdXeOP2jLdGgjOxIX9kSL
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-