General
-
Target
3068-3-0x0000000000400000-0x0000000000470000-memory.dmp
-
Size
448KB
-
Sample
240621-kezqvashqd
-
MD5
76d866b686d44e018ba244d3b1c1b458
-
SHA1
c5b1f9a20b2414a39c10042b1395d16fc7265789
-
SHA256
a38a7ec883605734368e75b1225cd5bbbe9a937d0f44be1769a7820c401c2054
-
SHA512
c181b39bbb7893d68ad079cb0f75b1157109602110d4192bda77b7b9daee91f3c26c264501f01021e2566351ce294d4361e703f845fd97905f5e0c92cefd8b1c
-
SSDEEP
6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4TYTExOI:jgiyOTaLqKB0T86dnhCsfB/auZeC
Behavioral task
behavioral1
Sample
3068-3-0x0000000000400000-0x0000000000470000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3068-3-0x0000000000400000-0x0000000000470000-memory.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
amadey
4.21
9a3efc
http://check-ftp.ru
-
install_dir
b9695770f1
-
install_file
Dctooux.exe
-
strings_key
1d3a0f2941c4060dba7f23a378474944
-
url_paths
/forum/index.php
Targets
-
-
Target
3068-3-0x0000000000400000-0x0000000000470000-memory.dmp
-
Size
448KB
-
MD5
76d866b686d44e018ba244d3b1c1b458
-
SHA1
c5b1f9a20b2414a39c10042b1395d16fc7265789
-
SHA256
a38a7ec883605734368e75b1225cd5bbbe9a937d0f44be1769a7820c401c2054
-
SHA512
c181b39bbb7893d68ad079cb0f75b1157109602110d4192bda77b7b9daee91f3c26c264501f01021e2566351ce294d4361e703f845fd97905f5e0c92cefd8b1c
-
SSDEEP
6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4TYTExOI:jgiyOTaLqKB0T86dnhCsfB/auZeC
Score1/10 -