Behavioral task
behavioral1
Sample
3980-3-0x00000000004C0000-0x000000000095A000-memory.exe
Resource
win7-20240611-en
General
-
Target
3980-3-0x00000000004C0000-0x000000000095A000-memory.dmp
-
Size
4.6MB
-
MD5
c9534f797ab3ba224b8bcfd4c928b75c
-
SHA1
201303f4e4578ffaecf45a8fa701a42f67e25e76
-
SHA256
d5d21dad85b2c4b1b777afe13f2b3f8cc3e116a7cb894f9ecde9557552de18e0
-
SHA512
47ec1b9aa9e6ec70fc7a7a0afe12ef3427b98c2bb6543fe0652573bc6ed5252fa95283d7f3b716d50813bc81bf373ec29a1c6a24a20166e2138c61cb6d93202f
-
SSDEEP
49152:GCXf1kO09Ds4U142Kto9vYQOEyXCo1w4+NqIG447fqTEHKWGXxEYmNp2:9v1kO2Dzq4jto9vY9CNqB447JHKja
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3980-3-0x00000000004C0000-0x000000000095A000-memory.dmp
Files
-
3980-3-0x00000000004C0000-0x000000000095A000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mxozowkw Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bbaydsub Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE