General

  • Target

    4488-3-0x0000000000400000-0x0000000000470000-memory.dmp

  • Size

    448KB

  • Sample

    240619-rzx63sscma

  • MD5

    53fa7b178af2cee4a4070725340fa0cf

  • SHA1

    75b01b3ca30978c49bd2ac41bb882418e3e78304

  • SHA256

    e477309f4533aa23a2b21bc17df6e2d9b48bd973104b70196572182016c3b28c

  • SHA512

    4e26c9d122082437cbc108474baacb79eb02ead55092455a22cde15200b810021a839d1427b7b2d48c3880f69200f5b9a1171e069debd07ea355c3a1afd384a9

  • SSDEEP

    6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4ZYTEy0I:jgiyOTaLqKB0T86dnhCsfB/auZe7

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Targets

    • Target

      4488-3-0x0000000000400000-0x0000000000470000-memory.dmp

    • Size

      448KB

    • MD5

      53fa7b178af2cee4a4070725340fa0cf

    • SHA1

      75b01b3ca30978c49bd2ac41bb882418e3e78304

    • SHA256

      e477309f4533aa23a2b21bc17df6e2d9b48bd973104b70196572182016c3b28c

    • SHA512

      4e26c9d122082437cbc108474baacb79eb02ead55092455a22cde15200b810021a839d1427b7b2d48c3880f69200f5b9a1171e069debd07ea355c3a1afd384a9

    • SSDEEP

      6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4ZYTEy0I:jgiyOTaLqKB0T86dnhCsfB/auZe7

    Score
    1/10

MITRE ATT&CK Matrix

Tasks