General

  • Target

    1640-3-0x0000000000400000-0x0000000000470000-memory.dmp

  • Size

    448KB

  • MD5

    f8a905cd01c29c62fb2b27aeafa81536

  • SHA1

    3e68d004ed4cbe04b0ecde4150ecb0b41e282abe

  • SHA256

    9604638429d74e3cd0f3dfdaf5c10a40f6221a41eefec096331ebc8bfa9d7227

  • SHA512

    340d1f962ed1645bccc74a68c8fd43c913dfc2bc66ca8137654c990ec7ef116e085ebf919b4e065981e1c882f39a72b6a1ee8c4e532f61322c908475d268a1cf

  • SSDEEP

    6144:F1/z3vI+00XyPB3sBTaR5Gn/3s1BidDOos6H86pPDrhCzg+4rBMeauZe4fYTEioI:jgiyOTaLqKB0T86dnhCsfB/auZe5

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

9a3efc

C2

http://check-ftp.ru

Attributes
  • install_dir

    b9695770f1

  • install_file

    Dctooux.exe

  • strings_key

    1d3a0f2941c4060dba7f23a378474944

  • url_paths

    /forum/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1640-3-0x0000000000400000-0x0000000000470000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections