General

  • Target

    3980-3-0x00000000004C0000-0x000000000095A000-memory.dmp

  • Size

    4.6MB

  • MD5

    c9534f797ab3ba224b8bcfd4c928b75c

  • SHA1

    201303f4e4578ffaecf45a8fa701a42f67e25e76

  • SHA256

    d5d21dad85b2c4b1b777afe13f2b3f8cc3e116a7cb894f9ecde9557552de18e0

  • SHA512

    47ec1b9aa9e6ec70fc7a7a0afe12ef3427b98c2bb6543fe0652573bc6ed5252fa95283d7f3b716d50813bc81bf373ec29a1c6a24a20166e2138c61cb6d93202f

  • SSDEEP

    49152:GCXf1kO09Ds4U142Kto9vYQOEyXCo1w4+NqIG447fqTEHKWGXxEYmNp2:9v1kO2Dzq4jto9vY9CNqB447JHKja

Score
10/10

Malware Config

Extracted

Family

amadey

Version

4.30

Botnet

4dd39d

C2

http://77.91.77.82

Attributes
  • install_dir

    ad40971b6b

  • install_file

    explorti.exe

  • strings_key

    a434973ad22def7137dbb5e059b7081e

  • url_paths

    /Hun4Ko/index.php

rc4.plain

Signatures

  • Amadey family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3980-3-0x00000000004C0000-0x000000000095A000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections