Behavioral task
behavioral1
Sample
444-32-0x0000000000A50000-0x0000000000F0E000-memory.exe
Resource
win7-20240903-en
General
-
Target
444-32-0x0000000000A50000-0x0000000000F0E000-memory.dmp
-
Size
4.7MB
-
MD5
e3a2483e2597d300b3c7d32b8d7ebd27
-
SHA1
efc8650dcab1aa0e9b6335d75bea111835a334fc
-
SHA256
f8dcb30591608f03190b9c9c6fe86d0f06b68e00971b3f0ce804445ef4634bd0
-
SHA512
0c6f53ca2799fea078fc74caff8264ec980d485af15fc675f2f2123bca8171de3efd1b78e325bad0aa67eadce98af30672a67f0d54c365ac30fee122b0593e83
-
SSDEEP
98304:D5AdCaoZV4Ir0U6TQPvFLi4c4maDD51A/88RlgUdY3afQD+wr:DXf+af51GeUdsaf2+q
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 444-32-0x0000000000A50000-0x0000000000F0E000-memory.dmp
Files
-
444-32-0x0000000000A50000-0x0000000000F0E000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kwpggdhq Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jxgfuawj Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE