General
-
Target
19c16dc48f8338ab746a0ad51d6bb02bb545dcc2045b9344089199fdc06c035b
-
Size
1.8MB
-
Sample
250129-s3rzxa1qgw
-
MD5
76015fd73208ee7a0dbb834a6b582d06
-
SHA1
f29f5c9afba2cc9ebba358db3356c2aac0701f0d
-
SHA256
19c16dc48f8338ab746a0ad51d6bb02bb545dcc2045b9344089199fdc06c035b
-
SHA512
bacc05bde9ca13791d223a42ac04b78d2e7d7407cd2b6daff29db71618fc8b84e85444d60bb12ef43bca4865e692e68da22787f69ff22d990cb61c1604ece878
-
SSDEEP
49152:ki+wnJ2RFwxVInSqpJJJ6XNajg5h5Ylx89O:kcKF8E5Owjg5haqO
Static task
static1
Behavioral task
behavioral1
Sample
19c16dc48f8338ab746a0ad51d6bb02bb545dcc2045b9344089199fdc06c035b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
19c16dc48f8338ab746a0ad51d6bb02bb545dcc2045b9344089199fdc06c035b.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
19c16dc48f8338ab746a0ad51d6bb02bb545dcc2045b9344089199fdc06c035b
-
Size
1.8MB
-
MD5
76015fd73208ee7a0dbb834a6b582d06
-
SHA1
f29f5c9afba2cc9ebba358db3356c2aac0701f0d
-
SHA256
19c16dc48f8338ab746a0ad51d6bb02bb545dcc2045b9344089199fdc06c035b
-
SHA512
bacc05bde9ca13791d223a42ac04b78d2e7d7407cd2b6daff29db71618fc8b84e85444d60bb12ef43bca4865e692e68da22787f69ff22d990cb61c1604ece878
-
SSDEEP
49152:ki+wnJ2RFwxVInSqpJJJ6XNajg5h5Ylx89O:kcKF8E5Owjg5haqO
Score10/10-
Amadey family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-