General

  • Target

    1368-1-0x0000000000400000-0x0000000001825000-memory.dmp

  • Size

    20.1MB

  • MD5

    05ded3c1889717d9ccefb85d3129bae7

  • SHA1

    d09442d330eb94f77192dd81bf767159cc4eb679

  • SHA256

    bb214c934e2e55efac910bfb725757236aba6839d9bc3b5df6d5a2a0103260d9

  • SHA512

    09edb1bc81cbc93a2a3841eab782b54efec31f3656509a4dff63e70e01fbc08c8b97d075ca9e2176c755db895b44ff46de5da251ae1f0f21c9f057e532851376

  • SSDEEP

    12288:jgiyOTaLqKB0T86dnhCsfB/auZet/TgN:jyOTaLR04iCak

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1368-1-0x0000000000400000-0x0000000001825000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections