Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/11/2024, 15:26

General

  • Target

    328-3-0x0000000000A40000-0x0000000000F00000-memory.exe

  • Size

    4.8MB

  • MD5

    0d80bf798d69cb84dea4de82064f06e3

  • SHA1

    cb00061c21dd0fcda0c3982d203e32c075007bb1

  • SHA256

    aa02f547f3140908e2e76ff0a04f9bec4db25ae5bb079dfb5a212ce18c3f5f51

  • SHA512

    ed64b789a89d6c5d465f0a043aa9d1cefe6392572fe9c25ec6d20a83c7fd011fcbdd09d48fc34b0e4c798d9c56ad7de078d4ff738d5cf1e1d6219aafb5880809

  • SSDEEP

    98304:6j9o3QNEUVPBSFYcFB2JttO+0DuamNpwIP5y+svm7:6xuktQDnmNpzd

Score
10/10

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family

Processes

  • C:\Users\Admin\AppData\Local\Temp\328-3-0x0000000000A40000-0x0000000000F00000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\328-3-0x0000000000A40000-0x0000000000F00000-memory.exe"
    1⤵
      PID:2856

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2856-0-0x0000000000A40000-0x0000000000F00000-memory.dmp

      Filesize

      4.8MB