Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 14:38

General

  • Target

    1940-34-0x00000000004B0000-0x00000000007D2000-memory.exe

  • Size

    3.1MB

  • MD5

    faa54530c89aca4624dc75398c1d9646

  • SHA1

    607de0487a602632792c6b5071040b3fc42eaa1f

  • SHA256

    d3a5d0262d25abeb52676b9eb9b342e93e335a84b5696c3d6a6ae49ef74b1243

  • SHA512

    46a5f5103d649eb6c4b68c4b867dbe34f7128cc3b6ac29b249e0a3997d04863dbb815d297495c7ac98774637dd63ce352d79d79df0926bd2a2841a60c749695e

  • SSDEEP

    49152:2Ff3YswC5cRQSDa1qnj5nBVs4AsVnBwSrVP8/PrHKgQ2:Kf3YswCWQSqqnj5nBqsVnBwWVP8LHHX

Score
10/10

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family

Processes

  • C:\Users\Admin\AppData\Local\Temp\1940-34-0x00000000004B0000-0x00000000007D2000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1940-34-0x00000000004B0000-0x00000000007D2000-memory.exe"
    1⤵
      PID:2136

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2136-0-0x00000000004B0000-0x00000000007D2000-memory.dmp

      Filesize

      3.1MB