MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0590cd6ecc0865f09c48eea98b04ff75fb49918eb14c0b0c53ce8215650acce3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 0590cd6ecc0865f09c48eea98b04ff75fb49918eb14c0b0c53ce8215650acce3
SHA3-384 hash: 3a449e5264d53c2d6427ee48b1639223bb9fd93b8458f20655855c5f13671d062cae6e79d1f2b4a97a1d9bace68af35a
SHA1 hash: 98814fd881d0db27245910475cffa5f6bc645406
MD5 hash: 7806508028c78ff39211cdfe01a070ef
humanhash: island-music-grey-florida
File name:SecuriteInfo.com.W32.AIDetect.malware1.20102.31484
Download: download sample
Signature Amadey
File size:2'558'134 bytes
First seen:2021-04-23 09:54:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ced282d9b261d1462772017fe2f6972b (127 x Formbook, 113 x GuLoader, 70 x RemcosRAT)
ssdeep 49152:Y7mY8pH4TXwyAuFjkzxF3uDfxKqj/qSmJYPKWOn6/YiM:Km34TXOgGxNuDfxKqjDyWQGYiM
TLSH 00C53383F391F7F6E0A6023261B28ECB99A7EE31255599E29FC777BD5972851050F003
Reporter SecuriteInfoCom
Tags:Amadey

Intelligence


File Origin
# of uploads :
1
# of downloads :
377
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3f2d34b3fb141b067720c4132dc2aac0.exe
Verdict:
Malicious activity
Analysis date:
2021-04-23 06:23:07 UTC
Tags:
trojan stealer raccoon evasion loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Sending a UDP request
Creating a file
Connecting to a non-recommended domain
Sending an HTTP POST request
Creating a file in the %temp% directory
Creating a process with a hidden window
Deleting a recently created file
Replacing files
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
Contains functionality to inject code into remote processes
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Amadey bot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-04-22 22:27:00 UTC
AV detection:
5 of 28 (17.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
d314210e33e596d84edf4eb02f32970ce9789e4fc410e6f113a1a8165953f341
MD5 hash:
ce7beeaf4109a354fcac904a776bacda
SHA1 hash:
3e9c59b4704651a41738eeda91a2589f151f7e7b
SH256 hash:
26a306d5b3747afb2dc18f5b8e4de7ded32626a2fca5b22ca65e4b6960f3270b
MD5 hash:
d9d050ac56b0388bde705815a7655e56
SHA1 hash:
9259da0940272aad021990ce6dfe26900e6d2767
SH256 hash:
0590cd6ecc0865f09c48eea98b04ff75fb49918eb14c0b0c53ce8215650acce3
MD5 hash:
7806508028c78ff39211cdfe01a070ef
SHA1 hash:
98814fd881d0db27245910475cffa5f6bc645406
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 0590cd6ecc0865f09c48eea98b04ff75fb49918eb14c0b0c53ce8215650acce3

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-23 10:00:15 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [C0032.001] Data Micro-objective::CRC32::Checksum
2) [C0026.002] Data Micro-objective::XOR::Encode Data
5) [C0045] File System Micro-objective::Copy File
6) [C0046] File System Micro-objective::Create Directory
7) [C0048] File System Micro-objective::Delete Directory
8) [C0047] File System Micro-objective::Delete File
9) [C0049] File System Micro-objective::Get File Attributes
10) [C0051] File System Micro-objective::Read File
11) [C0050] File System Micro-objective::Set File Attributes
12) [C0052] File System Micro-objective::Writes File
13) [E1510] Impact::Clipboard Modification
14) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
15) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
16) [C0036.002] Operating System Micro-objective::Delete Registry Key::Registry
17) [C0036.007] Operating System Micro-objective::Delete Registry Value::Registry
18) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
19) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
20) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
21) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
22) [C0017] Process Micro-objective::Create Process
23) [C0038] Process Micro-objective::Create Thread
24) [C0018] Process Micro-objective::Terminate Process