Gridinsoft Logo
File Icon

362d8f8fcc698554a750a5dfb1e261eb3b5442fb4bfe4746c8ba9431ec944305.exe Trojan Amadey Analysis

Technical Analysis

File Name 362d8f8fcc698554a750a5dfb1e261eb3b5442fb4bfe4746c8ba9431ec944305.exe
File Type
PE32 executable (GUI) Intel 80386, for MS Windows
Scanner Version 1.0.143.174
Database Version 2023-10-23 02:07:07 UTC

Trojan.Win32.Amadey.bot

Malware family: Amadey

Amadey is a Windows information stealer that uses persistence mechanisms and modular design to steal sensitive data. It typically infiltrates systems through phishing emails or malicious downloads. Once installed, it captures login credentials, personal data, and financial information. Its modular structure allows threat actors to customize functionality for specific attack objectives.
N/A
Detection Rate
620,032
File Size (bytes)
2023-10-23
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
0e4cce351d50179ad135e2f12a52e9fb
SHA1
47a8a4562b95f29a273f7df4371149887e5ba238
SHA256
362d8f8fcc698554a750a5dfb1e261eb3b5442fb4bfe4746c8ba9431ec944305
SHA512
b8bbfb06c8c096d0c2a4930bae1ecc971eeab792064acf5a75c7dca27f918bf5828e92313d84a27b4ccd0793e34d3c49a0af29cbab8398b0a03e215ea62dd0e0
ImpHash
646167cce332c1c252cdcb1839e0cf48

PE Analysis

Basic Information

Icon
Hash: 3e91cc67e146308239c15a39134ff14e
Fuzzy: 2e2cf0d16805fb9dfdfc9b2658485b99
dHash: f0f0f4d8c8c8d8f0
Image Base 0x00400000
Entry Point 0x00406a60
Compilation Time 2022-05-24 22:49:06
Checksum 0x000a2652 (Actual: 0x000a2652)
OS Version 10.0
PEiD Signatures PE32 executable (GUI) Intel 80386, for MS Windows
PDB Path wextract.pdb
Digital Signature The PE file does not contain a certificate table.
Imports 8 libraries
ADVAPI32, KERNEL32, GDI32, USER32, msvcrt, COMCTL32, Cabinet, VERSION
Exports 0 functions
Resources 43 Resources
Sections 5 Sections

Version Information

CompanyName Microsoft Corporation
FileDescription Win32 Cabinet Self-Extractor
FileVersion 11.00.17763.1 (WinBuild.160101.0800)
InternalName Wextract
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename WEXTRACT.EXE .MUI
ProductName Internet Explorer
ProductVersion 11.00.17763.1
Translation 0x0409 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 25,364 bytes 25,600 bytes 6.31 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ B0B66B32F4CA82E2E157C51B24DA0BE7
.data 0x00008000 6,728 bytes 512 bytes 4.97 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 7B9890A93C0516BB070E1170CFDE54D5
.idata 0x0000a000 4,178 bytes 4,608 bytes 5.03 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 67CE48BF2E7C8FE3321CA7AA188F77E2
.rsrc 0x0000c000 585,728 bytes 585,728 bytes 7.90 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 311EAE3B221AB17E543D0BE3FBCEC4E3
.reloc 0x0009b000 2,184 bytes 2,560 bytes 6.22 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 6025C825C4098EF081AC8EE3C8D5DD22
Entropy Analysis Alert

1 section(s) with high entropy (≥7.5) detected - possible packing/encryption

Resource Analysis

Total Resources: 43 (582,775 bytes)
Resource Type Count Total Size Percentage
AVI 1 11,802 bytes
2%
RT_ICON 13 85,490 bytes
14.7%
RT_DIALOG 6 2,584 bytes
0.4%
RT_STRING 6 6,208 bytes
1.1%
RT_RCDATA 14 473,453 bytes
81.2%
RT_GROUP_ICON 1 188 bytes
0%
RT_VERSION 1 1,032 bytes
0.2%
RT_MANIFEST 1 2,018 bytes
0.3%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

The PE file does not contain a certificate table.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Trojan.Win32.Amadey.bot Removal

Gridinsoft has the capability to identify and eliminate Trojan.Win32.Amadey.bot without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware