General
-
Target
6e68f9c02c91173c781db00cf19ae523.exe
-
Size
2.0MB
-
Sample
250214-hgd6tawnez
-
MD5
6e68f9c02c91173c781db00cf19ae523
-
SHA1
75f4cf0b0fd9da624b7ce90b833956100e92b86f
-
SHA256
90603f45fd2c0249d3dedea3be888fd4388f0ed0775700c619d8003be1657fd5
-
SHA512
6d83be94f743f7507b26c574b556e3ff1f7f6ae1f32b9e24d7c5d86c83d765fbacc7ba24b991673bb7dd1dd80eab0ecd5e882af65c2d64b90f4f75bf4b61a871
-
SSDEEP
49152:eU9C5scsjSfX0+CKfWYA8bWfeCzovJqWDPpEkJ:eU9C5Ts+P1BfWYA8bHCgJr7K0
Static task
static1
Behavioral task
behavioral1
Sample
6e68f9c02c91173c781db00cf19ae523.exe
Resource
win7-20240903-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://zefnecho.cyou/api
Targets
-
-
Target
6e68f9c02c91173c781db00cf19ae523.exe
-
Size
2.0MB
-
MD5
6e68f9c02c91173c781db00cf19ae523
-
SHA1
75f4cf0b0fd9da624b7ce90b833956100e92b86f
-
SHA256
90603f45fd2c0249d3dedea3be888fd4388f0ed0775700c619d8003be1657fd5
-
SHA512
6d83be94f743f7507b26c574b556e3ff1f7f6ae1f32b9e24d7c5d86c83d765fbacc7ba24b991673bb7dd1dd80eab0ecd5e882af65c2d64b90f4f75bf4b61a871
-
SSDEEP
49152:eU9C5scsjSfX0+CKfWYA8bWfeCzovJqWDPpEkJ:eU9C5Ts+P1BfWYA8bHCgJr7K0
-
Amadey family
-
Detect Poverty Stealer Payload
-
Lumma family
-
Povertystealer family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3