Behavioral task
behavioral1
Sample
2888-3-0x0000000000CE0000-0x00000000011B6000-memory.exe
Resource
win7-20240729-en
General
-
Target
2888-3-0x0000000000CE0000-0x00000000011B6000-memory.dmp
-
Size
4.8MB
-
MD5
394ccc8b0e2ed1f9b13114c3b6c60229
-
SHA1
e5beccc3c6b596932a4390c3636f1f98a945c8c3
-
SHA256
9a39e6f0785a4561e5e154adfd25e06f7f3c4ee5bc68ef2032ae5831b1ef3f9a
-
SHA512
aef9c7daabfb2fc8dd8fb77dbe1d02a716a0cb8ddc477e7af16edcecde382c67c76e65813c8cd372b968ad51458576db81267c0df1627f6a60fac828307f9006
-
SSDEEP
98304:spRcETgekt7L0yDiM6+fkdFqa43Janq2awAnUN1pXJEon+:so+fV+Fxa3X6h
Malware Config
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2888-3-0x0000000000CE0000-0x00000000011B6000-memory.dmp
Files
-
2888-3-0x0000000000CE0000-0x00000000011B6000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 182KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nnemzcju Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tqtxbhlh Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE