Behavioral task
behavioral1
Sample
3540-3-0x00000000004B0000-0x0000000000989000-memory.exe
Resource
win7-20240729-en
General
-
Target
3540-3-0x00000000004B0000-0x0000000000989000-memory.dmp
-
Size
4.8MB
-
MD5
f2d7aa3c6b2475cb6ce8f88d3dbe542f
-
SHA1
2fb0d1c45f8410cfa5e1f29599940053e996a161
-
SHA256
2a2c9324500ba1c35771d9c69dd8d2d791f15c5317cde2da27897722c6c6a50e
-
SHA512
7595c02e0929dbbde95a769c8869e55689b9118025e313afa1995e0338af3d34a9de9377dd663d467a4040c474196b8cc182be73ff58ea2a44280ef8bc445084
-
SSDEEP
49152:g5eexicqR1D4Sewv3h6Kwad6gH5T8IKYdGK+Q6w4fzATvtMLmxQfP5d17ugcv:PexicqPGwv3Wad6c5T8dK+Q6tMwJhc
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3540-3-0x00000000004B0000-0x0000000000989000-memory.dmp
Files
-
3540-3-0x00000000004B0000-0x0000000000989000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pwkywykv Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rrneryzn Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE