Behavioral task
behavioral1
Sample
2600-3-0x0000000000890000-0x0000000000BA2000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2600-3-0x0000000000890000-0x0000000000BA2000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2600-3-0x0000000000890000-0x0000000000BA2000-memory.dmp
-
Size
3.1MB
-
MD5
d53360718c0b6330d151c510b83b815a
-
SHA1
99ac69d53d54099ede67356489ecbcbc26db64fc
-
SHA256
d3ff7073da490259dca474b464debfe3b1651a22d9dcdcb7eb61d42cf2ce4abd
-
SHA512
26cc055fc4ab000a174665056ee72320660648a2d4c83b8ef1d2d5da2d4f59cf12b9d978d6becd8b222fa2eead2dbb469cfa67390a423de0e3da467b540fa6db
-
SSDEEP
24576:bKx0NM31IOC+vBFHRoF4GEOxWXVG9v9L5t24ZPqM0KjYB54DlGFrtft6Zxa3V1Mk:ueN+1e+59GaRXVGV9L5t2KTwQkTcauD
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2600-3-0x0000000000890000-0x0000000000BA2000-memory.dmp
Files
-
2600-3-0x0000000000890000-0x0000000000BA2000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
amsvbsdx Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
whqaxgia Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE