Behavioral task
behavioral1
Sample
2156-13-0x0000000000E10000-0x0000000001218000-memory.exe
Resource
win7-20231215-en
General
-
Target
2156-13-0x0000000000E10000-0x0000000001218000-memory.dmp
-
Size
4.0MB
-
MD5
13dff875b2ae88c55b506872a4cc2962
-
SHA1
c55fa819c209593842908a588f4d832e527a715a
-
SHA256
e44cf8b834526195e5984f8b51710a8420e265acd75f1724f721a3c322b3f334
-
SHA512
cff1f16f6234d36d2c7267dc1079d0cba2e27d37d080fbfc6dd23e0cd8309086046f17fca9d56c529b211cdf5c9ed17b6e3b7335de5a00fbff7f29b2267f2ebb
-
SSDEEP
49152:h3E7bG5ybDE6IVeVdGtWnAlpadsLK+mZSgfpF:e7bG5ybDE6ueVdGVpavSgfp
Malware Config
Extracted
amadey
4.15
http://185.215.113.68
-
install_dir
d887ceb89d
-
install_file
explorhe.exe
-
strings_key
7cadc181267fafff9df8503e730d60e1
-
url_paths
/theme/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2156-13-0x0000000000E10000-0x0000000001218000-memory.dmp
Files
-
2156-13-0x0000000000E10000-0x0000000001218000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 143KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 26KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 2KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 617KB - Virtual size: 620KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE