General

  • Target

    4312-426-0x0000000000400000-0x000000000069B000-memory.dmp

  • Size

    2.6MB

  • MD5

    08e810936b93a68a90945cc6b8c6b4b9

  • SHA1

    c4cb05ee306782263d04ec1d3b7a6c19efda1470

  • SHA256

    92d5e2a88676c1dd0abadda77e3d2f817317a3e9ec75d177b7be88360d6e2cd1

  • SHA512

    a959c07b1c206ee2fd2b1a74e72664d50ca06cfc5be975d62ae67e624406c3d26f9f3aab2cd45672f2932816101033359c174939dbca137fc127acf33fae6337

  • SSDEEP

    6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4/YTE3Fo:jgiyOTaLqKB0T86dnhCsfB/auZeFJ

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4312-426-0x0000000000400000-0x000000000069B000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections