Analysis

  • max time kernel
    0s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 09:19

Errors

Reason
platform exec: image=C:\Users\Admin\AppData\Local\Temp\3760-32-0x0000000000B20000-0x0000000000E3A000-memory.exe command="C:\Users\Admin\AppData\Local\Temp\3760-32-0x0000000000B20000-0x0000000000E3A000-memory.exe" wdir=C:\Users\Admin\AppData\Local\Temp Payload error: The application has failed to start because its side-by-side configuration is incorrect. Please see the application event log or use the command-line sxstrace.exe tool for more detail.

General

  • Target

    3760-32-0x0000000000B20000-0x0000000000E3A000-memory.exe

  • Size

    3.1MB

  • MD5

    a177f51d814a24640b6de55742ab3526

  • SHA1

    908e55bed9d26c3b9b9854b0e1e5c9882c66d5ce

  • SHA256

    435d5c54b8fe112b48e48cdbd414ab83a183b49fa22e1139b4c573522cb49f55

  • SHA512

    5ee3543551729dc451a12f20cfe642273c9fc18d8073585ab1d812e49a0c48ce5e2263502f474416f72e8f7dd464685f02d8c5be8814f32c2484c98536676ddb

  • SSDEEP

    24576:Z8Ulfhg9muxRcRnSocm/xm9NO4NpJNFDl7Yo++p8RXU3WzzmXoQjkSkIya82lIbk:5lZgvRyn/R/8bJYum6mLtK4SVv

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family

Processes

  • C:\Users\Admin\AppData\Local\Temp\3760-32-0x0000000000B20000-0x0000000000E3A000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3760-32-0x0000000000B20000-0x0000000000E3A000-memory.exe"
    1⤵
      PID:3556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3556-0-0x0000000000B20000-0x0000000000E3A000-memory.dmp

      Filesize

      3.1MB