General

  • Target

    2688-63-0x0000000000B30000-0x0000000000FD0000-memory.dmp

  • Size

    4.6MB

  • MD5

    8fdb2ff2fa4d99bddfcabadf12aa3466

  • SHA1

    e59e21ca179c93e92569b32f865a48525123e51e

  • SHA256

    c0068b303dfa24b0a0142889c4aadabd5d4af3fe45147ebd306e0845f6da87eb

  • SHA512

    96ddc0e014e1077b4681bfa39c15e310d690a513a8b29b692522e65ae78f774fd8dc829034cd096eb82886ac597cb2eb1d7767459b37c02a441b8961067e92e1

  • SSDEEP

    98304:lCJ1cq0eTn4yMYjx+NG1ZfrMJwXbsfg2rFCYLHD:lERSer7AXJrLj

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2688-63-0x0000000000B30000-0x0000000000FD0000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections