Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2024 12:02

General

  • Target

    2372-3-0x00000000010F0000-0x00000000015BA000-memory.exe

  • Size

    4.8MB

  • MD5

    05a9e6e6bf2ed5f6c2f31ef817fc1d94

  • SHA1

    2d44850e464d36f39ce176013d623cac8a4cea8a

  • SHA256

    7b7a162ade51d18e49229f0044e15d1b0d57f168fdbea5d78e31a06d25486d35

  • SHA512

    db423d8d9542cd0721e9dba01e9be481900d397a1e4e4fdefd01cb4c7fd8c42512fdd663f8ca4e4737d203cce24939cd1ffc5445830b6a7983a92f7c89788875

  • SSDEEP

    98304:x6f1Hn1xKeqCkVurvB3CAH+ARqzsd9d8CkMGzWA75RrWDua:x+DBSA9RRJfA755a

Score
10/10

Malware Config

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family

Processes

  • C:\Users\Admin\AppData\Local\Temp\2372-3-0x00000000010F0000-0x00000000015BA000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2372-3-0x00000000010F0000-0x00000000015BA000-memory.exe"
    1⤵
      PID:2672

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2672-0-0x00000000010F0000-0x00000000015BA000-memory.dmp

      Filesize

      4.8MB