Behavioral task
behavioral1
Sample
amadey_v2.exe
Resource
win7-20230220-en
General
-
Target
amadey_v2.bin
-
Size
188KB
-
MD5
361cad979b8efd8a32647efef5ea08b3
-
SHA1
bdcde6402e9b7d6ea3ba7def710c5f68c4bbab46
-
SHA256
1de852bd90636a3d75a91ce249d5ae4a777d04064847e404295ac0bb647b4687
-
SHA512
fa77906df9c98308feffbb0d12b228fb13341a1253bb90b82248a34c04eb5c81b3dfbc9724514ed8b1226e1a89c07ad07dfd8f08758c2ae423fc124e92c1275c
-
SSDEEP
3072:+QCFPNk72p7iLtBX6XNs8Bt747erjuKGZqpRMWZBQAMbmn:+QCFPtp7i5BKXnP7puKGWoe
Malware Config
Extracted
amadey
2.08
45.155.205.65/b1a5gkSc2/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource amadey_v2.bin
Files
-
amadey_v2.bin.exe windows x86
37feaa2c735711635bed71303ba0b945
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathW
CreateMutexW
WaitForSingleObject
CreateFileW
GetVersionExW
SuspendThread
GetComputerNameExW
ResumeThread
GetModuleHandleA
Sleep
GetLastError
GetFileAttributesA
CreateFileA
CloseHandle
GetSystemInfo
LoadLibraryW
GetModuleFileNameW
HeapAlloc
GetThreadContext
GetProcAddress
VirtualAllocEx
LocalFree
ReadProcessMemory
GetComputerNameW
GetProcessHeap
GetModuleHandleW
FreeLibrary
CreateProcessA
CreateDirectoryA
SetThreadContext
WriteConsoleW
SetEndOfFile
HeapReAlloc
VirtualAlloc
WriteFile
VirtualFree
HeapFree
WriteProcessMemory
CreateThread
GetModuleFileNameA
HeapSize
GetTimeZoneInformation
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
CompareStringW
LCMapStringW
DeleteFileW
GetCurrentDirectoryW
GetFullPathNameW
SetStdHandle
GetConsoleCP
GetConsoleMode
GetFileSizeEx
SetFilePointerEx
ReadFile
ReadConsoleW
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
DecodePointer
user32
GetSystemMetrics
advapi32
ConvertSidToStringSidW
GetUserNameW
LookupAccountNameW
shell32
ShellExecuteA
ShellExecuteExW
wininet
InternetConnectW
HttpSendRequestW
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetOpenUrlW
HttpOpenRequestW
Sections
.text Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ