General

  • Target

    3068-3-0x0000000000400000-0x0000000000470000-memory.dmp

  • Size

    448KB

  • Sample

    240621-kezqvashqd

  • MD5

    76d866b686d44e018ba244d3b1c1b458

  • SHA1

    c5b1f9a20b2414a39c10042b1395d16fc7265789

  • SHA256

    a38a7ec883605734368e75b1225cd5bbbe9a937d0f44be1769a7820c401c2054

  • SHA512

    c181b39bbb7893d68ad079cb0f75b1157109602110d4192bda77b7b9daee91f3c26c264501f01021e2566351ce294d4361e703f845fd97905f5e0c92cefd8b1c

  • SSDEEP

    6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4TYTExOI:jgiyOTaLqKB0T86dnhCsfB/auZeC

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Targets

    • Target

      3068-3-0x0000000000400000-0x0000000000470000-memory.dmp

    • Size

      448KB

    • MD5

      76d866b686d44e018ba244d3b1c1b458

    • SHA1

      c5b1f9a20b2414a39c10042b1395d16fc7265789

    • SHA256

      a38a7ec883605734368e75b1225cd5bbbe9a937d0f44be1769a7820c401c2054

    • SHA512

      c181b39bbb7893d68ad079cb0f75b1157109602110d4192bda77b7b9daee91f3c26c264501f01021e2566351ce294d4361e703f845fd97905f5e0c92cefd8b1c

    • SSDEEP

      6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4TYTExOI:jgiyOTaLqKB0T86dnhCsfB/auZeC

    Score
    1/10

MITRE ATT&CK Matrix

Tasks