General
-
Target
887ec0652a1c4b0d8a0b75290b63e718d8bf758aff9293fa193d55326922d6a3
-
Size
1.8MB
-
Sample
250124-z242eazpdm
-
MD5
f01a3904285332477fd5904ac9a7ecdc
-
SHA1
5bf346e63d0028b9cd8f671a9bb332381f3e5ffa
-
SHA256
887ec0652a1c4b0d8a0b75290b63e718d8bf758aff9293fa193d55326922d6a3
-
SHA512
aa4698e8e0d7acd34dafb1ae5912414c418c99903108c40f8dc0e03f46e51dfe50908dc756e23caf84474a500ffda6c627b36b35c8d43c6b78fa7f395929481e
-
SSDEEP
49152:mSrmqKXd+Qjd+TL8E1lX/8qUYitUxNI0yWJCn+KznzoF:xmzXMHTtlX/BxNrAn+uzw
Static task
static1
Behavioral task
behavioral1
Sample
887ec0652a1c4b0d8a0b75290b63e718d8bf758aff9293fa193d55326922d6a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
887ec0652a1c4b0d8a0b75290b63e718d8bf758aff9293fa193d55326922d6a3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
887ec0652a1c4b0d8a0b75290b63e718d8bf758aff9293fa193d55326922d6a3
-
Size
1.8MB
-
MD5
f01a3904285332477fd5904ac9a7ecdc
-
SHA1
5bf346e63d0028b9cd8f671a9bb332381f3e5ffa
-
SHA256
887ec0652a1c4b0d8a0b75290b63e718d8bf758aff9293fa193d55326922d6a3
-
SHA512
aa4698e8e0d7acd34dafb1ae5912414c418c99903108c40f8dc0e03f46e51dfe50908dc756e23caf84474a500ffda6c627b36b35c8d43c6b78fa7f395929481e
-
SSDEEP
49152:mSrmqKXd+Qjd+TL8E1lX/8qUYitUxNI0yWJCn+KznzoF:xmzXMHTtlX/BxNrAn+uzw
Score10/10-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-