General

  • Target

    2168-3-0x0000000000FF0000-0x00000000014C9000-memory.dmp

  • Size

    4.8MB

  • MD5

    8da1ab78d83fe27437ae6f40c60f3f28

  • SHA1

    e877748929b8dd06893e3285379609d2a3e1078c

  • SHA256

    0252ceac821c98af8b2e3fe79a82d8c455b4d3d6119864313ade805bd5d308be

  • SHA512

    040be315213c25b892e702ff66b70608f98dfb2260961811a69b77b755f474475f5f25a9018be4b6c24b603897bcc7fda454c5719df7608cf15779d27a1f174b

  • SSDEEP

    98304:OD/d6R1tzo64llvMVY3mW5d5KyQmWCH57pQAJo12:OFMVM5DLH5dVJk2

Score
10/10

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2168-3-0x0000000000FF0000-0x00000000014C9000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections