General
-
Target
89a17c7e1f6a2bb674179c230f5de7fdc67f91de9d7ce3858c7d08d7a5fbd6b0N
-
Size
3.5MB
-
Sample
250113-lc36xswqfs
-
MD5
b3e58c669b1086e68b831e0be4c63360
-
SHA1
15fda1e1f04727f0c1f1f373757c6aaf3c8e2cce
-
SHA256
89a17c7e1f6a2bb674179c230f5de7fdc67f91de9d7ce3858c7d08d7a5fbd6b0
-
SHA512
4334cc75c68bcc76c3f97c95d89540a89a7c871c82186c1ac763449961e1acbb04a7311e914701d9ac2007d04687b27de2a0002f390982c0975b811c985a8775
-
SSDEEP
98304:Wg26LqqLz83YWkoAji54c4bUWbVHWr+iEBoBxJURRtN:s6mqM3YXFc4UgVc+bBoBxJUR1
Static task
static1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
89a17c7e1f6a2bb674179c230f5de7fdc67f91de9d7ce3858c7d08d7a5fbd6b0N
-
Size
3.5MB
-
MD5
b3e58c669b1086e68b831e0be4c63360
-
SHA1
15fda1e1f04727f0c1f1f373757c6aaf3c8e2cce
-
SHA256
89a17c7e1f6a2bb674179c230f5de7fdc67f91de9d7ce3858c7d08d7a5fbd6b0
-
SHA512
4334cc75c68bcc76c3f97c95d89540a89a7c871c82186c1ac763449961e1acbb04a7311e914701d9ac2007d04687b27de2a0002f390982c0975b811c985a8775
-
SSDEEP
98304:Wg26LqqLz83YWkoAji54c4bUWbVHWr+iEBoBxJURRtN:s6mqM3YXFc4UgVc+bBoBxJUR1
-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-