Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 18:49

General

  • Target

    2116-3-0x00000000000B0000-0x000000000056F000-memory.exe

  • Size

    4.7MB

  • MD5

    37c88410400089001e75b030198d72b0

  • SHA1

    1c4a271746c6073c6be265624c29fa58fa411e8c

  • SHA256

    5be0da14bc62f3fc0a3297f2661dd22a4111d11d4f4b6350ac5308bf5949727c

  • SHA512

    7ea8c59ae8ea90b25da2fd5b6f7cb6f652a26a6ab0a73ff03c9f35e7f1cba5cc3ea59281403ab7888d170ee4898ff0a3be9d9b3954a3db7335a12d85e6b676b7

  • SSDEEP

    98304:7MwmcvZXk1dSUVY/q2cL9FGa7BwT36dXnyewQnAOujz/MOix66Gr:7dE7L9Y0wbSXyeTSz0O

Score
10/10

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family

Processes

  • C:\Users\Admin\AppData\Local\Temp\2116-3-0x00000000000B0000-0x000000000056F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2116-3-0x00000000000B0000-0x000000000056F000-memory.exe"
    1⤵
      PID:1452

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1452-0-0x00000000000B0000-0x000000000056F000-memory.dmp

      Filesize

      4.7MB