Behavioral task
behavioral1
Sample
5892-172-0x0000000000380000-0x0000000000831000-memory.exe
Resource
win7-20240221-en
General
-
Target
5892-172-0x0000000000380000-0x0000000000831000-memory.dmp
-
Size
4.7MB
-
MD5
673377e3059fc43591f3303c9442bdb7
-
SHA1
607c74353184a29c5d3e4f052c22ef2097966fd2
-
SHA256
7e630ad356b3796e52b786db8e144d3657dabfb5b1e5a1b4b45ec330cb697e5e
-
SHA512
09712a8288a69cf8051a1f07fc880a890c851dba8d6268d5a404ce1cb49211f156735630ba9c1f92d1fe0855a3e8c534d4bcb05da7142df75afae669861e3e01
-
SSDEEP
98304:By1qqVwBbO9rey7c7IWOit7l9pZhjOiRi9uSi713F:BiNc73ptzpOiRH/7n
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5892-172-0x0000000000380000-0x0000000000831000-memory.dmp
Files
-
5892-172-0x0000000000380000-0x0000000000831000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 181KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lydyflpv Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dmmsjxrq Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE