General
-
Target
21745e1b35d8b4650dedcd3ee95c7004.exe
-
Size
2.0MB
-
Sample
250214-hjjjbawkcr
-
MD5
21745e1b35d8b4650dedcd3ee95c7004
-
SHA1
468da12d40f653e0a294592fd79784959633fe2b
-
SHA256
00f17690a2eb58bddfc6a0f11c532590f2f44a476a0157cdcb9c52c5dc35c15d
-
SHA512
9a3a91d63b8de8b2e2b71fed9326fe9cae6537cf51e7f4ddb419d004c003567bbc2439b3f9b411feb02f0da3e585e307ce1e606c78bfef52c3037566710a4d23
-
SSDEEP
49152:uYLUah84Hxl2gtrNozvXpa15lL+HkGqjJx1EVh1z:uYLUa5Rl2Jzsl6HVqj31UH
Static task
static1
Behavioral task
behavioral1
Sample
21745e1b35d8b4650dedcd3ee95c7004.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21745e1b35d8b4650dedcd3ee95c7004.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
C:\Program Files\7-Zip\Lang\HOW TO DECRYPT FILES.txt
https://coinatmradar.com/
https://www.localbitcoins.com/
Targets
-
-
Target
21745e1b35d8b4650dedcd3ee95c7004.exe
-
Size
2.0MB
-
MD5
21745e1b35d8b4650dedcd3ee95c7004
-
SHA1
468da12d40f653e0a294592fd79784959633fe2b
-
SHA256
00f17690a2eb58bddfc6a0f11c532590f2f44a476a0157cdcb9c52c5dc35c15d
-
SHA512
9a3a91d63b8de8b2e2b71fed9326fe9cae6537cf51e7f4ddb419d004c003567bbc2439b3f9b411feb02f0da3e585e307ce1e606c78bfef52c3037566710a4d23
-
SSDEEP
49152:uYLUah84Hxl2gtrNozvXpa15lL+HkGqjJx1EVh1z:uYLUa5Rl2Jzsl6HVqj31UH
-
Amadey family
-
Detect Poverty Stealer Payload
-
Detected Xorist Ransomware
-
Povertystealer family
-
Xorist family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (4633) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3