Gridinsoft Logo
File Icon

Dctooux.exe Trojan Amadey Analysis

Technical Analysis

File Name Dctooux.exe
File Type
PE32 executable (GUI) Intel 80386, for MS Windows
Scanner Version 1.0.179.174
Database Version 2024-06-13 16:00:39 UTC

Trojan.Win32.Amadey.tr

Malware family: Amadey

Amadey is a Windows information stealer that uses persistence mechanisms and modular design to steal sensitive data. It typically infiltrates systems through phishing emails or malicious downloads. Once installed, it captures login credentials, personal data, and financial information. Its modular structure allows threat actors to customize functionality for specific attack objectives.
N/A
Detection Rate
397,824
File Size (bytes)
2024-06-13
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
b301aadbc50a1ab085f8ef2268aed5e2
SHA1
435d32f0176818fc8bdcced29b58e359894b7f27
SHA256
7b4dc90b59760320253596a753556de932a32fd1967726b7321a0095760f7bcf
SHA512
698c8ca820f1e973d3671243eee4aeaec93a52711577ec885be89018cefdb3fed992995c210c9e78b06ef2b134fa60cc8406e87862357613282102bf76cb299d
ImpHash
759b6088a173126a12a6f044026a6925

PE Analysis

Basic Information

Icon
Hash: 6399e5b02aa9ccf05207f108d122f385
Fuzzy: 27d041a43177618d7bd4cdbe6adb4ae3
dHash: c8b4a4a4a4a494e0
Image Base 0x00400000
Entry Point 0x004043ff
Compilation Time 2023-10-10 14:19:53
Checksum 0x00069e1c (Actual: 0x00069e1c)
OS Version 5.1
PEiD Signatures PE32 executable (GUI) Intel 80386, for MS Windows
Digital Signature The PE file does not contain a certificate table.
Imports 5 libraries
KERNEL32, USER32, GDI32, ADVAPI32, WINHTTP
Exports 0 functions
Resources 30 Resources
Sections 4 Sections

Version Information

FileVersions 76.23.27.13
InternalName Storm
FileDescription Line
LegalCopyright Copyrights (C) 2023, fulletienen
OriginalFilenames GileraScooters
ProductName Viejestedios
ProductVersions 68.51.78.19
Translation 0x16fe 0x06da

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 69,290 bytes 69,632 bytes 6.70 (Compressed) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 0A1003EFA98016C7CF15D700D9260E08
.rdata 0x00012000 28,240 bytes 28,672 bytes 4.77 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 296F3EEF47F0B3DF0BE50E3C45F969A8
.data 0x00019000 2,536,296 bytes 243,200 bytes 7.92 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 7341A2B93820E963CA73FB7D60D7D38A
.rsrc 0x00285000 55,112 bytes 55,296 bytes 4.51 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 86DE5E4024D63026AE482482463F20FF
Entropy Analysis Alert

1 section(s) with high entropy (≥7.5) detected - possible packing/encryption

1 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 30 (53,490 bytes)
Resource Type Count Total Size Percentage
RT_CURSOR 11 22,536 bytes
42.1%
RT_ICON 7 24,824 bytes
46.4%
RT_STRING 6 5,172 bytes
9.7%
RT_GROUP_CURSOR 4 178 bytes
0.3%
RT_GROUP_ICON 1 104 bytes
0.2%
RT_VERSION 1 676 bytes
1.3%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

The PE file does not contain a certificate table.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Trojan.Win32.Amadey.tr Removal

Gridinsoft has the capability to identify and eliminate Trojan.Win32.Amadey.tr without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware