Behavioral task
behavioral1
Sample
2060-3-0x0000000000FD0000-0x000000000148D000-memory.exe
Resource
win7-20240220-en
General
-
Target
2060-3-0x0000000000FD0000-0x000000000148D000-memory.dmp
-
Size
4.7MB
-
MD5
66aa0c7fb32464254638b655d63e1a42
-
SHA1
c8706f063005333346d122ba41c60ceeb1e1267a
-
SHA256
52428ad537a55d3e6b33bca0f8eb559269cb3bb15158da49f345f9a6ed0189a4
-
SHA512
841e62a753c5d2cab07b642fdcab6a8f4f81f4067aaf88b3962392ae21d46a41805713933c370a716775b0fe1585aab754cfa9605a9bb8b06c3d71a2880b73d8
-
SSDEEP
98304:r/vM0q7VAf9U9O0q8EXCVIsM9jMs7vRN:r8k3C2NMs7v
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2060-3-0x0000000000FD0000-0x000000000148D000-memory.dmp
Files
-
2060-3-0x0000000000FD0000-0x000000000148D000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rhsekzmb Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
egdrnlqb Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE