Behavioral task
behavioral1
Sample
2464-10-0x0000000000400000-0x0000000000471000-memory.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
2464-10-0x0000000000400000-0x0000000000471000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
2464-10-0x0000000000400000-0x0000000000471000-memory.dmp
-
Size
452KB
-
MD5
f357382d5ab2ec2fab879870d4cc7d14
-
SHA1
5970fcafbd476dd8fc0b72c5dd3669881a512772
-
SHA256
39cd1c29db00fae05e2005f7236845e2780d2e2bc5919528d010d7d9705f654e
-
SHA512
bde379102e2a6e14739d76b6663733e9d236862d00cf2afa0fcade93ddbea513baa844ca2f32408ecaa04554dcb4d196a7f416f42d226685682254d4b14c8db5
-
SSDEEP
6144:9u9smHYnoZYgExr/9v5auT1Oqe61I7JP7mBOdRQWB18HgFiELdZ0YvOWmBpumehq:msmHuL9V1M7XhB1kvELvYWmBpumeO
Malware Config
Extracted
amadey
4.13
http://65.108.99.238
http://brodoyouevenlift.co.za
-
strings_key
bda044f544861e32e95f5d49b3939bcc
-
url_paths
/yXNwKVfkS28Y/index.php
/g5ddWs/index.php
/pOVxaw24d/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2464-10-0x0000000000400000-0x0000000000471000-memory.dmp
Files
-
2464-10-0x0000000000400000-0x0000000000471000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 331KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ