General

  • Target

    2104-3-0x0000000000400000-0x0000000000470000-memory.dmp

  • Size

    448KB

  • Sample

    240619-ng3gastenn

  • MD5

    f567e575801670f2f4fc1474e79b560c

  • SHA1

    1af33f8995ae70003c9bbb937eac8e7a5a249a83

  • SHA256

    04f391f1fbf39f1f7a0bab63f7ae263cbb44d5e6a864f2663cdd88aaffb15b45

  • SHA512

    0880a74311fa352230370e143295c818c67b76fe2dfdeefcfeacad9fcb04be3a777d38d0451af858d8bbd31ccc63a6281231f750e46469d261334fbd3fb12bee

  • SSDEEP

    6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4+YTE1DI:jgiyOTaLqKB0T86dnhCsfB/auZe2

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Targets

    • Target

      2104-3-0x0000000000400000-0x0000000000470000-memory.dmp

    • Size

      448KB

    • MD5

      f567e575801670f2f4fc1474e79b560c

    • SHA1

      1af33f8995ae70003c9bbb937eac8e7a5a249a83

    • SHA256

      04f391f1fbf39f1f7a0bab63f7ae263cbb44d5e6a864f2663cdd88aaffb15b45

    • SHA512

      0880a74311fa352230370e143295c818c67b76fe2dfdeefcfeacad9fcb04be3a777d38d0451af858d8bbd31ccc63a6281231f750e46469d261334fbd3fb12bee

    • SSDEEP

      6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4+YTE1DI:jgiyOTaLqKB0T86dnhCsfB/auZe2

    Score
    1/10

MITRE ATT&CK Matrix

Tasks