Behavioral task
behavioral1
Sample
2112-3-0x00000000003B0000-0x00000000006C2000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2112-3-0x00000000003B0000-0x00000000006C2000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2112-3-0x00000000003B0000-0x00000000006C2000-memory.dmp
-
Size
3.1MB
-
MD5
23f517bce9ebfe9a63c63131a636e74a
-
SHA1
428a30c5ab54a6d3c2036c433c5defff0dc2091c
-
SHA256
06a66ac6365a6e380967e24ade099b1245a018a43bb8ca89b51b42d302987f9c
-
SHA512
b7c8266f4ad31bf468f828db45ea4e8b08e5d75d4764c5dff0e9bd733652b279e5f380b8f806d7f5ea049cfa5cdd8e3adf632f13c6d4feaf2c4f70017eaad81f
-
SSDEEP
49152:2b84o+HMU7wgLMx7tvg4EdSpSugKW+ZnQ189GD:go+HMU7wgYx7tvhdpSugKWYQdD
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2112-3-0x00000000003B0000-0x00000000006C2000-memory.dmp
Files
-
2112-3-0x00000000003B0000-0x00000000006C2000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hsmahktm Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vyraapnb Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE