Behavioral task
behavioral1
Sample
1332-3-0x0000000000D00000-0x00000000011C1000-memory.exe
Resource
win7-20240611-en
General
-
Target
1332-3-0x0000000000D00000-0x00000000011C1000-memory.dmp
-
Size
4.8MB
-
MD5
17b5d2db5ddfaab8f8cdd3d540b53293
-
SHA1
47ddbf09ef470ae3450c30eef58d46bc5230bf4b
-
SHA256
838eff4a256eb12839aad215237f45194df5110e92d9b23f51035301d3292a68
-
SHA512
e01be7de3eaf8c3f4dc0afd2ad309683e7f598fdea0b350cd480b4561b30af22a5442df1652e1c70ad9366c4c1b3aaeba6961dbb11f267e05361f7bf06ae01e7
-
SSDEEP
98304:HG8gCRc8Wrrig2pAD3MG4wgc1SqQ8/9JOyRawNnVtuId:HFp4cG4bc1jh/vOyRlNVgu
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1332-3-0x0000000000D00000-0x00000000011C1000-memory.dmp
Files
-
1332-3-0x0000000000D00000-0x00000000011C1000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oeclzjuu Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fcnqbruu Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE