General

  • Target

    1268-11-0x0000000000320000-0x0000000000391000-memory.dmp

  • Size

    452KB

  • MD5

    1ef32141322c7e6c3f9da51280c1e700

  • SHA1

    fe5babaebcca013c2b2e76aad2d0d87fd6aa7c3e

  • SHA256

    c858a59f2cc1bcee47acddef4dcabd07a2144bc1bd3b1058c91d7f27954acf4e

  • SHA512

    ad777ef11755df9be74053ccd260d00055e4233827ddba4a3017f372cfe0b3be1a687d835d68fc8537eeb275ce3157a22e940d31a7e30020c2fc26391bc7729e

  • SSDEEP

    12288:8XLamprzQG73+zVw3JPbI6eJUTkTym5uW2kHZxSJAjI6:8XjZzQG73qVkJD4qTCNHZxdN

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.15

C2

http://rubyonthewal.xyz

Attributes
  • install_dir

    a51d6af4de

  • install_file

    augloopclient.exe

  • strings_key

    a50fbc3107802624cf7eb9fd0961eb7a

  • url_paths

    /g9jjjbnAdshZ/index.php

rc4.plain

Signatures

Files

  • 1268-11-0x0000000000320000-0x0000000000391000-memory.dmp