General
-
Target
3155be7728a26e030b17bdb83892b2321544c30a752d4b007b524397a271a3e7N.exe
-
Size
2.0MB
-
Sample
250224-14xwjszqz3
-
MD5
5988043642d0fec538aadb4ca54e2b50
-
SHA1
a5db279945d0efd2a7f96138836633a6e3cb8d3d
-
SHA256
3155be7728a26e030b17bdb83892b2321544c30a752d4b007b524397a271a3e7
-
SHA512
436e3b2d6864202ede2e74eff6dac2d4b3b88bf96104af38fbe0fc2844ce17cb86a99828543cbc0b03351b46c464dde499eb11fefe33567559782a7347e7216d
-
SSDEEP
49152:I8AgzfLPLaVf+yRqi50W0LKoxmG05hx6z28H2H:I8AofLWVf9H2moxm5txo2
Static task
static1
Behavioral task
behavioral1
Sample
3155be7728a26e030b17bdb83892b2321544c30a752d4b007b524397a271a3e7N.exe
Resource
win7-20250207-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
3155be7728a26e030b17bdb83892b2321544c30a752d4b007b524397a271a3e7N.exe
-
Size
2.0MB
-
MD5
5988043642d0fec538aadb4ca54e2b50
-
SHA1
a5db279945d0efd2a7f96138836633a6e3cb8d3d
-
SHA256
3155be7728a26e030b17bdb83892b2321544c30a752d4b007b524397a271a3e7
-
SHA512
436e3b2d6864202ede2e74eff6dac2d4b3b88bf96104af38fbe0fc2844ce17cb86a99828543cbc0b03351b46c464dde499eb11fefe33567559782a7347e7216d
-
SSDEEP
49152:I8AgzfLPLaVf+yRqi50W0LKoxmG05hx6z28H2H:I8AofLWVf9H2moxm5txo2
-
Amadey family
-
Gcleaner family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-