General
-
Target
ab45aef26f5e3abf89c5881c2bda82b8499038ee90b100d6733dffc11e779118.exe
-
Size
1.8MB
-
Sample
250124-fygl6a1qcx
-
MD5
d8385d260d11ce4c3ba395df5655e5c1
-
SHA1
6580a1ebe6e92cde8f6f619f3ac10b77d0fd0108
-
SHA256
ab45aef26f5e3abf89c5881c2bda82b8499038ee90b100d6733dffc11e779118
-
SHA512
17532da0f0452b74dc11f59c425cdbf4fae0cdcebf5af50c6a0f1f8bbbdd661af7079fabe4e275d5f9431bd6f812f0634c26696117e8978d168482836cb06828
-
SSDEEP
49152:pCPqZosxNFVMhLrfmtGwScDkZ8rV4fVu78i7kZ:EqO/LrfpnZhfV286
Static task
static1
Behavioral task
behavioral1
Sample
ab45aef26f5e3abf89c5881c2bda82b8499038ee90b100d6733dffc11e779118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ab45aef26f5e3abf89c5881c2bda82b8499038ee90b100d6733dffc11e779118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
ab45aef26f5e3abf89c5881c2bda82b8499038ee90b100d6733dffc11e779118.exe
-
Size
1.8MB
-
MD5
d8385d260d11ce4c3ba395df5655e5c1
-
SHA1
6580a1ebe6e92cde8f6f619f3ac10b77d0fd0108
-
SHA256
ab45aef26f5e3abf89c5881c2bda82b8499038ee90b100d6733dffc11e779118
-
SHA512
17532da0f0452b74dc11f59c425cdbf4fae0cdcebf5af50c6a0f1f8bbbdd661af7079fabe4e275d5f9431bd6f812f0634c26696117e8978d168482836cb06828
-
SSDEEP
49152:pCPqZosxNFVMhLrfmtGwScDkZ8rV4fVu78i7kZ:EqO/LrfpnZhfV286
Score10/10-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-