General

  • Target

    5172-50-0x0000000000400000-0x0000000000470000-memory.dmp

  • Size

    448KB

  • MD5

    0de008970d3245a5567d2e8f7fe8455d

  • SHA1

    ef9686f90ce4d33a01fa585ffc6610a21cf57c00

  • SHA256

    5b9589c132d5dcb6975b1f918289143a7ffc1e70fda9262cb14927bbde52b84e

  • SHA512

    c498feb9a641b45b2b42c0aadf4d7efbfd9ae0ab9693c5daafc90ab0855e0690a0dcbcb0abdf53881713f2864abf56af5b3421bb9512cc8b24648058d31a065f

  • SSDEEP

    6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe45YTE9RI:jgiyOTaLqKB0T86dnhCsfB/auZeN

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5172-50-0x0000000000400000-0x0000000000470000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections