Behavioral task
behavioral1
Sample
2016-2-0x0000000001290000-0x0000000001732000-memory.exe
Resource
win7-20231129-en
General
-
Target
2016-2-0x0000000001290000-0x0000000001732000-memory.dmp
-
Size
4.6MB
-
MD5
9b743a47f581f47ae25f988b62dd7b6d
-
SHA1
d3b4292327b24d1c0eeeccc4f46353929435cfe0
-
SHA256
934031e990be2d7fc63ccb81b767c5ddaa4b84ebdc1a5a4ce97050d137943d2f
-
SHA512
213242ab85dae39b8d428b110d81f858b45fa5eee8a5a841995bb5d40dde890a584952ff552cb37149578ae28bfdcb405a0322c3007ac53787871faf6b21232c
-
SSDEEP
98304:ZnFAtAuXLs1J53z6xxODL/v9+LmxUYkdSfGVoWdvdSwJsh:ZYe/3F+LLYUSuVoav4wJs
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2016-2-0x0000000001290000-0x0000000001732000-memory.dmp
Files
-
2016-2-0x0000000001290000-0x0000000001732000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 181KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gcostfeu Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ktbxrtyp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE