General

  • Target

    4068-3-0x0000000000830000-0x0000000000CF0000-memory.dmp

  • Size

    4.8MB

  • MD5

    f78ff10a13740d109af9c8128e2632b4

  • SHA1

    6376d7437ca6d52ce965b5d628c3e912ed29ce10

  • SHA256

    fe14d6246048496fe52f7db79dbb650b0d185628186575d97271e337c5d64385

  • SHA512

    f2edddbd8360787ea0a66e704938e9ea29d7c985386c18ff409df07a5b17743a811b4574f6a771a1fc30328bae6d773c866c9463f2397bb146047756202c31a7

  • SSDEEP

    98304:+5tyVoXO+I7F1JWNuDBQsLuYo9OJ48lXoEL20pBST3hn6:+Yx1c4/CYo9H6C0sn6

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.30

Botnet

4dd39d

C2

http://77.91.77.82

Attributes
  • install_dir

    ad40971b6b

  • install_file

    explorti.exe

  • strings_key

    a434973ad22def7137dbb5e059b7081e

  • url_paths

    /Hun4Ko/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4068-3-0x0000000000830000-0x0000000000CF0000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections