General

  • Target

    2020-2-0x0000000000260000-0x00000000006FF000-memory.dmp

  • Size

    4.6MB

  • MD5

    cfec1e1a9865a8157798430456535d50

  • SHA1

    1d31044776679064bf8bbccb5c545403ae130f29

  • SHA256

    cc3179c27e42087b8c10c6a489fa05093ace1d224ca98f3032e0369bedab0bf9

  • SHA512

    a0da7cb10dbb932d332b245ddfbfb2656ef05dc0728ffe4e58ba4f23623a2dcbba1893733b325c08f2bf614b3e997adb1c07d162a47e849c87153e5b95c7d0c9

  • SSDEEP

    98304:u/oP8iMHfGFLoxTNAwcSewgpIlYkwL6od:u/fVeTql8Ljd

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.17

Botnet

b68ccf

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-2-0x0000000000260000-0x00000000006FF000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections