General

  • Target

    5616-157-0x0000000000570000-0x0000000000A1A000-memory.dmp

  • Size

    4.7MB

  • MD5

    37f45fa36477db237f5817a6504630af

  • SHA1

    22250b20bc72853cc0dd817877feae9581b2a5b9

  • SHA256

    ea929bbd4cd6169c3b810f97bea7d10ff9a8d81ba10bd21e819d861904ba9ec9

  • SHA512

    0051c1a9d6116931bbea95e8fcfdbf3447754d6b8f5cf2c08803a342e4a077ff9127a79644b65bf6ec3bb964f994d1246297aad5edc58d40e5849896ccb1cc01

  • SSDEEP

    98304:ckMKp5DlDhKG65VcVDqAOpPq0VdhNbQwrN34N/0:VxqAqJVdhNbQ4IN/

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5616-157-0x0000000000570000-0x0000000000A1A000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections