General
-
Target
21745e1b35d8b4650dedcd3ee95c7004.exe
-
Size
2.0MB
-
Sample
250214-hftj4swndt
-
MD5
21745e1b35d8b4650dedcd3ee95c7004
-
SHA1
468da12d40f653e0a294592fd79784959633fe2b
-
SHA256
00f17690a2eb58bddfc6a0f11c532590f2f44a476a0157cdcb9c52c5dc35c15d
-
SHA512
9a3a91d63b8de8b2e2b71fed9326fe9cae6537cf51e7f4ddb419d004c003567bbc2439b3f9b411feb02f0da3e585e307ce1e606c78bfef52c3037566710a4d23
-
SSDEEP
49152:uYLUah84Hxl2gtrNozvXpa15lL+HkGqjJx1EVh1z:uYLUa5Rl2Jzsl6HVqj31UH
Static task
static1
Behavioral task
behavioral1
Sample
21745e1b35d8b4650dedcd3ee95c7004.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
21745e1b35d8b4650dedcd3ee95c7004.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
21745e1b35d8b4650dedcd3ee95c7004.exe
-
Size
2.0MB
-
MD5
21745e1b35d8b4650dedcd3ee95c7004
-
SHA1
468da12d40f653e0a294592fd79784959633fe2b
-
SHA256
00f17690a2eb58bddfc6a0f11c532590f2f44a476a0157cdcb9c52c5dc35c15d
-
SHA512
9a3a91d63b8de8b2e2b71fed9326fe9cae6537cf51e7f4ddb419d004c003567bbc2439b3f9b411feb02f0da3e585e307ce1e606c78bfef52c3037566710a4d23
-
SSDEEP
49152:uYLUah84Hxl2gtrNozvXpa15lL+HkGqjJx1EVh1z:uYLUa5Rl2Jzsl6HVqj31UH
-
Amadey family
-
Detect Poverty Stealer Payload
-
Povertystealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1