Behavioral task
behavioral1
Sample
3176-3-0x0000000000190000-0x000000000065B000-memory.exe
Resource
win7-20240704-en
General
-
Target
3176-3-0x0000000000190000-0x000000000065B000-memory.dmp
-
Size
4.8MB
-
MD5
83d4dc9485965a94133f3b94e4d21d3b
-
SHA1
dc3131824e8a5233114db7c0eae2918317b38628
-
SHA256
f0f0f43437406845faee3d3b17d0624746e01e69ac17cab1effde819f46ced09
-
SHA512
b5c4489bd276f35544134972cc63be940001571d8572cbb539d95cb64245ef6bee6bb1a4c9ca163ab09c2b477547a34b9f26f7d5cc368a2aa74c7de10da336f9
-
SSDEEP
98304:ykC5OBQ4QqQJmnYbrxc6L44n7l9myU/xb5B/uq8beLsdXr9TJg6wuPf:y9pVU/x/8beLsZhJtwuPf
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3176-3-0x0000000000190000-0x000000000065B000-memory.dmp
Files
-
3176-3-0x0000000000190000-0x000000000065B000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qzdianbh Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mknmfmsy Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE