Analysis

  • max time kernel
    115s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 07:58

General

  • Target

    2664-0-0x0000000000A40000-0x0000000000EFA000-memory.exe

  • Size

    4.7MB

  • MD5

    4c7a257a2dd05f709e34538939b95138

  • SHA1

    a6d530fff6a7ccd3c621896b5c3368c56a21be3f

  • SHA256

    fe2399815473a8a67ece143d067c29e22e46dc413d5cdcca2f6dabed6acacc6b

  • SHA512

    9912fc264e1521cf580f572e31d55117fe6fb438608051813f7d1e8a672ec54c95b67fe355c448b8fc21ba35d1fedb118973d44723920fe94b542933a87eafa0

  • SSDEEP

    6144:n1hGCRxNsRRHjGa7xPM4kdyp+5dPXgau:rlR3sRFj/vkdpX

Score
10/10

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family

Processes

  • C:\Users\Admin\AppData\Local\Temp\2664-0-0x0000000000A40000-0x0000000000EFA000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2664-0-0x0000000000A40000-0x0000000000EFA000-memory.exe"
    1⤵
      PID:3412

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3412-0-0x0000000000A40000-0x0000000000EFA000-memory.dmp

      Filesize

      4.7MB

    • memory/3412-1-0x0000000000A40000-0x0000000000EFA000-memory.dmp

      Filesize

      4.7MB