Behavioral task
behavioral1
Sample
1572-3-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1572-3-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win10v2004-20240611-en
General
-
Target
1572-3-0x0000000000400000-0x0000000000472000-memory.dmp
-
Size
456KB
-
MD5
41684a1c86136eaa464672eb71c22fa1
-
SHA1
40b24e4d15ad61b1a44bf9c637a1534b6f6aa13e
-
SHA256
153b5ffc0e9e3907567a5c3869375356240da02c95881b6974bae62e38750b8f
-
SHA512
59b8f80056998ab57240b8425b48db45d95059a5d31551f6ae2e775765f58c45cf39abd2f1493e688525d47d94121b3e07e65037a13cdd42f5a40ec8828ccdc3
-
SSDEEP
12288:58m7eJ8uBNne5pAeNaeLSPBWKuJ+Q8NxEvR47:5u8uBNnopx5Sg8eR47
Malware Config
Extracted
amadey
4.19
8fc809
http://nudump.com
http://otyt.ru
http://selltix.org
-
install_dir
b739b37d80
-
install_file
Dctooux.exe
-
strings_key
65bac8d4c26069c29f1fd276f7af33f3
-
url_paths
/forum/index.php
/forum2/index.php
/forum3/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1572-3-0x0000000000400000-0x0000000000472000-memory.dmp
Files
-
1572-3-0x0000000000400000-0x0000000000472000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 329KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ