Behavioral task
behavioral1
Sample
4196-3-0x0000000000840000-0x0000000000D0E000-memory.exe
Resource
win7-20240708-en
General
-
Target
4196-3-0x0000000000840000-0x0000000000D0E000-memory.dmp
-
Size
4.8MB
-
MD5
38c274796a71025eed40ab1b389bf7cc
-
SHA1
6185e51f661ece5d80c49a2015a938f33f448cb6
-
SHA256
57176133e2b8d6ff69001ec250bf5ceb1feb5a8c17e1adf2e1db64417f14b3f9
-
SHA512
7c7f9f39133965b02cf505f07a7ab944f85ba5d837d3e93059444ada921606b6ab4fe1229f2f90c61938112835984fd829ac8bcccebd50e22ace487bc5388b85
-
SSDEEP
98304:dk+GnYgJQCa31eIZ3hEAAsrnYCftK6j+98Idoob1w8hJ8Z:dLhEANrYatUFdoOvhq
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4196-3-0x0000000000840000-0x0000000000D0E000-memory.dmp
Files
-
4196-3-0x0000000000840000-0x0000000000D0E000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aosdyjib Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ttauocqi Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE