General
-
Target
48d937fa6be9ae343b73f310d17b19421380dac61897724b46fb955fb28eefc3
-
Size
5.6MB
-
Sample
250224-s1bvxaznv2
-
MD5
d0f5c2e8b4fb77405e01017371282e4c
-
SHA1
3c07c0d45bc3232d4d050c670a577f67fd77b522
-
SHA256
48d937fa6be9ae343b73f310d17b19421380dac61897724b46fb955fb28eefc3
-
SHA512
9c8118b69232968c5b2d1cb895defbff73caf6e756254270eabf5d364f3005341bb598a54453d32e051c6c56eb4551bb3e1d4e07afe20992f82715908df59ad7
-
SSDEEP
98304:awlBVIUhJBeYJj7BHJnKT7XciKjONCcEBNMMtNd4SwX6lxaqyxcJ:LBVnzAsj7BpnKTYiGOccq+gNaSlmq6c
Static task
static1
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
48d937fa6be9ae343b73f310d17b19421380dac61897724b46fb955fb28eefc3
-
Size
5.6MB
-
MD5
d0f5c2e8b4fb77405e01017371282e4c
-
SHA1
3c07c0d45bc3232d4d050c670a577f67fd77b522
-
SHA256
48d937fa6be9ae343b73f310d17b19421380dac61897724b46fb955fb28eefc3
-
SHA512
9c8118b69232968c5b2d1cb895defbff73caf6e756254270eabf5d364f3005341bb598a54453d32e051c6c56eb4551bb3e1d4e07afe20992f82715908df59ad7
-
SSDEEP
98304:awlBVIUhJBeYJj7BHJnKT7XciKjONCcEBNMMtNd4SwX6lxaqyxcJ:LBVnzAsj7BpnKTYiGOccq+gNaSlmq6c
-
Amadey family
-
Stealc family
-
Tofsee family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-