General

  • Target

    2912-64-0x0000000000A30000-0x0000000000EE3000-memory.dmp

  • Size

    4.7MB

  • MD5

    044c889f6c620490cd42ae477847a2d1

  • SHA1

    6557c79ca46e6cbdfcd862391114da89e832de7f

  • SHA256

    daf1e43ea4604c4db5225972295a4d17626239b0bd49dc176370de3cea0be195

  • SHA512

    cb7477837e64ec13798c0a6c3376b223054116c5a14065d193bd026f76545868b2a4a394a7ec4bcb9dee14363af884f9db8c51c97675a9f40a68fef5bdff79d0

  • SSDEEP

    98304:uPOX03pMvo3A0s4ASqxeygDrw8/1CkxklBVs3mgp:u+iw8dCkmBVs3mg

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2912-64-0x0000000000A30000-0x0000000000EE3000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections