General
-
Target
b04a90c730d689a618b004b5b6536ce9e818195e560ee647c7d6f2209b5eea9c
-
Size
3.2MB
-
Sample
250225-rxqn8azpz3
-
MD5
730cea7cebf1928f14abe0d409f98f1c
-
SHA1
d84f7600b7bff3755fc127a8b815a789e0be6731
-
SHA256
b04a90c730d689a618b004b5b6536ce9e818195e560ee647c7d6f2209b5eea9c
-
SHA512
2fa82027f7cb2fd6fc8813cd682587f2ed1308b6adbb01698c62b2dc5e08c0db7944f94fc2aa88fdb37ccfd3e60b6e55e9b1a6a8564c431e4ef3425ea185aa69
-
SSDEEP
49152:vfzjyxkrLj2kfvNaFz7Bs+Z5Ft2hc/y47uHEulW7kdaqzW5mz7:vfzjukbdfFaFzVs+Z5FhX7MLJYe7
Static task
static1
Behavioral task
behavioral1
Sample
b04a90c730d689a618b004b5b6536ce9e818195e560ee647c7d6f2209b5eea9c.exe
Resource
win7-20241023-en
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
b04a90c730d689a618b004b5b6536ce9e818195e560ee647c7d6f2209b5eea9c
-
Size
3.2MB
-
MD5
730cea7cebf1928f14abe0d409f98f1c
-
SHA1
d84f7600b7bff3755fc127a8b815a789e0be6731
-
SHA256
b04a90c730d689a618b004b5b6536ce9e818195e560ee647c7d6f2209b5eea9c
-
SHA512
2fa82027f7cb2fd6fc8813cd682587f2ed1308b6adbb01698c62b2dc5e08c0db7944f94fc2aa88fdb37ccfd3e60b6e55e9b1a6a8564c431e4ef3425ea185aa69
-
SSDEEP
49152:vfzjyxkrLj2kfvNaFz7Bs+Z5Ft2hc/y47uHEulW7kdaqzW5mz7:vfzjukbdfFaFzVs+Z5FhX7MLJYe7
-
Amadey family
-
Gcleaner family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-