Behavioral task
behavioral1
Sample
1964-3-0x0000000001350000-0x0000000001800000-memory.exe
Resource
win7-20240705-en
General
-
Target
1964-3-0x0000000001350000-0x0000000001800000-memory.dmp
-
Size
4.7MB
-
MD5
0e256a289d397139a4c066dc4d9ace28
-
SHA1
c14546d2edea4c48a77843b6b51e9e06b269ca48
-
SHA256
8c9d10872e9af17f2beb43ed505483ea9c5d2a185fa14423f946eb28070107b3
-
SHA512
a362e929f3920952fcb56dcad2bd9c9317386857e3316bcb8e9deb74051daaeee52477f44a51cbc36b7a8008e8a57d20b1418a506d2a72567e77ef21fc64010a
-
SSDEEP
49152:cy1BskS3WMieUSuo6b6h3IC1pL/27IuTpkIRTwgWswOnleSvTHU4XgnZjNj:L1BskuRdUXb6RIObqLkIbfnleIbkx
Malware Config
Extracted
amadey
4.20
c767c0
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1964-3-0x0000000001350000-0x0000000001800000-memory.dmp
Files
-
1964-3-0x0000000001350000-0x0000000001800000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pgngpehr Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cbmywntr Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE