Behavioral task
behavioral1
Sample
3608-31-0x0000000000650000-0x0000000000976000-memory.exe
Resource
win7-20240903-en
General
-
Target
3608-31-0x0000000000650000-0x0000000000976000-memory.dmp
-
Size
3.1MB
-
MD5
bc200c90e4e949efcbf51d59adbbd530
-
SHA1
b4bce8a416f6afb5be14d5137848dead4b505452
-
SHA256
1c30965a75b59fefdf62a7ed19354cc2d33469096e0a4e77815e93ac1815f66c
-
SHA512
c448dd6195bfe9a6de5692342359309b49d49d566f0290f4b9c112c93a567ac4d25d4c04a1700b62d99771dd16da4292652a7bf174eced96540ec6b07450816c
-
SSDEEP
49152:XgM0dCFogMDf9IhrISFGS7zF/wku4FAeTPiRz:wM0dCFogMDf9IlISFGS7xNHWePe
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3608-31-0x0000000000650000-0x0000000000976000-memory.dmp
Files
-
3608-31-0x0000000000650000-0x0000000000976000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 416KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
taeyjhzp Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qrlsutxh Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE