Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 19:03

General

  • Target

    1680-3-0x0000000000220000-0x00000000006BF000-memory.exe

  • Size

    4.6MB

  • MD5

    ff580328a0747dea7a7f37e8a7e7c37a

  • SHA1

    3ee4fa2dea091e200006ffae7dc1cb3c91d102db

  • SHA256

    12e64c2bcbea2f0fc18790672c9b361756a51f04fd369566822d46e58c3bc0a0

  • SHA512

    cbc8c2b301942c371bc8f8daa5a0eb562fe19ea9c19271f2917e32f8077de210590d324f1334dad57f39af267d92503e90f088c45faca65a3321ef619fecb839

  • SSDEEP

    49152:BnEWvSxXn/zT8F73JuWy86ZvQaDf7Ek/ICer9/vgBt+TJqUYvZ2P:SWvSxXn/zT8VJuWy3Zj77EcIFr8+f

Score
10/10

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family

Processes

  • C:\Users\Admin\AppData\Local\Temp\1680-3-0x0000000000220000-0x00000000006BF000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1680-3-0x0000000000220000-0x00000000006BF000-memory.exe"
    1⤵
      PID:2372

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2372-0-0x0000000000220000-0x00000000006BF000-memory.dmp

      Filesize

      4.6MB