Behavioral task
behavioral1
Sample
2920-2-0x0000000000BD0000-0x0000000001092000-memory.exe
Resource
win7-20240215-en
General
-
Target
2920-2-0x0000000000BD0000-0x0000000001092000-memory.dmp
-
Size
4.8MB
-
MD5
cbbfb5a44eab84697390b6886fdad6ba
-
SHA1
7822e1f406076424a22eacec9d2c7307a5321fa0
-
SHA256
2761dbfe74dd2fb6a1e0535d5d7655b59f55b88e7e8f31a07d3b37c835262d76
-
SHA512
20a04a162ca1f3ea42d4c329b6119489e7bf1e1fc386d3dc4f3f30e775bdbb8e4415da2c8c07c417bafd66307f2b8fc2ebcd15819d9d8a193fb9f05d06be7938
-
SSDEEP
98304:7PfTunFuvYGt/byQDfgk0ttzVMZLmrkL1MGP:7UYgtta8ILiG
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2920-2-0x0000000000BD0000-0x0000000001092000-memory.dmp
Files
-
2920-2-0x0000000000BD0000-0x0000000001092000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 181KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qemajjdk Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gyskosuy Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE