Behavioral task
behavioral1
Sample
4880-2-0x00000000001E0000-0x00000000006A2000-memory.exe
Resource
win7-20240221-en
General
-
Target
4880-2-0x00000000001E0000-0x00000000006A2000-memory.dmp
-
Size
4.8MB
-
MD5
a94228ebcd681b9734cc6644ed3c26ce
-
SHA1
456c4bdce90c783cf31c89976a3c16f5f8f4c81e
-
SHA256
cc69fcf351ac2b44d3cfd66da402353c5c09601f320006c9c0a38a01905221a5
-
SHA512
c6c322f4f16d5179ac5c85c4da2b81676e1c88850e381ea0f3b31e4403e4fea5dc19b329d193aa9dcd8dffad8ad0e7d09b98fdb948086bb14c4f9996e5dcef28
-
SSDEEP
98304:GZXESccXP0wxnojalW+YPeN2oBYX80SGVupkBMQgXp:Gncq4QySOupkBMQgX
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4880-2-0x00000000001E0000-0x00000000006A2000-memory.dmp
Files
-
4880-2-0x00000000001E0000-0x00000000006A2000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 181KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
luffhbjx Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vlullesl Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE