Behavioral task
behavioral1
Sample
4068-3-0x0000000000830000-0x0000000000CF0000-memory.exe
Resource
win7-20240221-en
General
-
Target
4068-3-0x0000000000830000-0x0000000000CF0000-memory.dmp
-
Size
4.8MB
-
MD5
f78ff10a13740d109af9c8128e2632b4
-
SHA1
6376d7437ca6d52ce965b5d628c3e912ed29ce10
-
SHA256
fe14d6246048496fe52f7db79dbb650b0d185628186575d97271e337c5d64385
-
SHA512
f2edddbd8360787ea0a66e704938e9ea29d7c985386c18ff409df07a5b17743a811b4574f6a771a1fc30328bae6d773c866c9463f2397bb146047756202c31a7
-
SSDEEP
98304:+5tyVoXO+I7F1JWNuDBQsLuYo9OJ48lXoEL20pBST3hn6:+Yx1c4/CYo9H6C0sn6
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Signatures
-
Amadey family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4068-3-0x0000000000830000-0x0000000000CF0000-memory.dmp
Files
-
4068-3-0x0000000000830000-0x0000000000CF0000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dcmspmqj Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ibpvakke Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE