Behavioral task
behavioral1
Sample
3032-3-0x0000000001110000-0x00000000015D9000-memory.exe
Resource
win7-20240704-en
General
-
Target
3032-3-0x0000000001110000-0x00000000015D9000-memory.dmp
-
Size
4.8MB
-
MD5
6ad7660a5753b8b1ffa28a99ca7c6d08
-
SHA1
e59318897b40d85108f2f8578b21fd6e02007a2b
-
SHA256
860a050c5c3ae02675a78ac982ed61f64ce3359ba95e566d292ab086b2f0908a
-
SHA512
029dc6f81d8bc8b2ea655e3483cdcb3c3124a38bdff32c18232a3c9da032212fa3798a725d411cfd4aa5e9ddd157f99f928ea768472c11f8a2e101a1fab3ccaf
-
SSDEEP
98304:R+HPHYvy8tc20eiZI940YBYq0iswRgfNpfQPl2vGpms:RmGlrwqVpYU
Malware Config
Extracted
amadey
4.20
c767c0
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3032-3-0x0000000001110000-0x00000000015D9000-memory.dmp
Files
-
3032-3-0x0000000001110000-0x00000000015D9000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mpblsfag Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fitqatkf Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE