General
-
Target
1268-11-0x0000000000320000-0x0000000000391000-memory.dmp
-
Size
452KB
-
MD5
1ef32141322c7e6c3f9da51280c1e700
-
SHA1
fe5babaebcca013c2b2e76aad2d0d87fd6aa7c3e
-
SHA256
c858a59f2cc1bcee47acddef4dcabd07a2144bc1bd3b1058c91d7f27954acf4e
-
SHA512
ad777ef11755df9be74053ccd260d00055e4233827ddba4a3017f372cfe0b3be1a687d835d68fc8537eeb275ce3157a22e940d31a7e30020c2fc26391bc7729e
-
SSDEEP
12288:8XLamprzQG73+zVw3JPbI6eJUTkTym5uW2kHZxSJAjI6:8XjZzQG73qVkJD4qTCNHZxdN
Score
10/10
Malware Config
Extracted
Family
amadey
Version
4.15
C2
http://rubyonthewal.xyz
Attributes
-
install_dir
a51d6af4de
-
install_file
augloopclient.exe
-
strings_key
a50fbc3107802624cf7eb9fd0961eb7a
-
url_paths
/g9jjjbnAdshZ/index.php
rc4.plain
Signatures
-
Amadey family
Files
-
1268-11-0x0000000000320000-0x0000000000391000-memory.dmp