MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19f0386456060982bf9880a31c55022371ea3825c10f5ecca1310c8219ed738c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 17


Intelligence 17 IOCs YARA 16 File information Comments

SHA256 hash: 19f0386456060982bf9880a31c55022371ea3825c10f5ecca1310c8219ed738c
SHA3-384 hash: 27f25f651a3e4b730b3b51d048c4527627597d1834569c4107ef2eb9c11d1a5e6097ebd141cbb2f750fb22c8bf358040
SHA1 hash: 7d623da1383f4716516bc4d26c6019d7591ba657
MD5 hash: f8088e078ab49d272abcd0e70d69178d
humanhash: jupiter-juliet-ten-beryllium
File name:file
Download: download sample
Signature Amadey
File size:1'873'920 bytes
First seen:2023-10-12 22:53:43 UTC
Last seen:2023-10-15 22:29:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 656cd5db2ac8991527380581e92b3981 (1 x Amadey)
ssdeep 24576:vON6qV/q9+QoRsTwyCwswxjCrVWJNF/j5U:2BOnwAswxjSchO
Threatray 385 similar samples on MalwareBazaar
TLSH T11F85E251D9A06C23F0A6E53658C5502E1B75F9321D2C5CEA37DC3808EA3EEF1249BD7A
TrID 68.7% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
27.1% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
1.4% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.3% (.SCR) Windows screen saver (13097/50/3)
0.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 00b08ece8e8e8600 (1 x Amadey)
Reporter andretavare5
Tags:Amadey exe


Avatar
andretavare5
Sample downloaded from https://vk.com/doc52355237_666885040?hash=Eqp5Rrzr5xgY9khTZnRwzjYAxfEZtEhwBG25MWuWMQs&dl=ZgXLSLq985E109sn2xXZN8CdVzp0oXzbERb9S4vpal8&api=1&no_preview=1#7s

Intelligence


File Origin
# of uploads :
61
# of downloads :
335
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-10-12 22:55:09 UTC
Tags:
amadey botnet stealer loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Creating a file
Sending an HTTP POST request
Delayed reading of the file
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Sending a custom TCP request
Adding an access-denied ACE
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Enabling autorun by creating a file
Gathering data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control keylogger lolbin shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1325017 Sample: file.exe Startdate: 13/10/2023 Architecture: WINDOWS Score: 100 87 Snort IDS alert for network traffic 2->87 89 Found malware configuration 2->89 91 Malicious sample detected (through community Yara rule) 2->91 93 5 other signatures 2->93 9 file.exe 4 2->9         started        13 Utsysc.exe 2->13         started        15 Utsysc.exe 2->15         started        17 2 other processes 2->17 process3 file4 83 C:\Users\user\AppData\Local\...\Utsysc.exe, PE32 9->83 dropped 103 Detected unpacking (changes PE section rights) 9->103 105 Detected unpacking (overwrites its own PE header) 9->105 107 Contains functionality to inject code into remote processes 9->107 19 Utsysc.exe 19 9->19         started        24 rundll32.exe 13->24         started        26 rundll32.exe 13->26         started        28 cmd.exe 13->28         started        30 schtasks.exe 13->30         started        32 cmd.exe 15->32         started        34 rundll32.exe 15->34         started        36 schtasks.exe 15->36         started        38 2 other processes 15->38 signatures5 process6 dnsIp7 85 77.91.97.162, 49741, 49742, 49743 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 19->85 75 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 19->75 dropped 77 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 19->77 dropped 79 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 19->79 dropped 81 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 19->81 dropped 95 Antivirus detection for dropped file 19->95 97 Creates an undocumented autostart registry key 19->97 99 Uses schtasks.exe or at.exe to add and modify task schedules 19->99 40 cmd.exe 1 19->40         started        42 rundll32.exe 19->42         started        53 3 other processes 19->53 44 rundll32.exe 24->44         started        101 System process connects to network (likely due to code injection or exploit) 26->101 55 3 other processes 28->55 47 conhost.exe 30->47         started        57 3 other processes 32->57 49 rundll32.exe 34->49         started        51 conhost.exe 36->51         started        file8 signatures9 process10 signatures11 59 conhost.exe 40->59         started        61 cmd.exe 1 40->61         started        63 cacls.exe 1 40->63         started        71 4 other processes 40->71 65 rundll32.exe 42->65         started        109 Tries to harvest and steal browser information (history, passwords, etc) 44->109 67 WerFault.exe 49->67         started        69 conhost.exe 53->69         started        process12 process13 73 WerFault.exe 20 16 65->73         started       
Threat name:
Win32.Trojan.Znyonm
Status:
Malicious
First seen:
2023-10-12 22:54:06 UTC
File Type:
PE (Exe)
Extracted files:
49
AV detection:
12 of 22 (54.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Amadey
Unpacked files
SH256 hash:
686843d48819c4c53e03cb1eca5a4a40082fe24c201b01ce6c0eecbe7c5a7e1c
MD5 hash:
ef70b147c0a5d36421a2e3a444d24f2c
SHA1 hash:
8c5aa0cbc8533bba3d010f2126a6a8b9424a29fb
Detections:
Amadey
SH256 hash:
19f0386456060982bf9880a31c55022371ea3825c10f5ecca1310c8219ed738c
MD5 hash:
f8088e078ab49d272abcd0e70d69178d
SHA1 hash:
7d623da1383f4716516bc4d26c6019d7591ba657
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly
Description:Amadey Payload
Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_Amadey
Author:ditekSHen
Description:Amadey downloader payload
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Amadey_7abb059b
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments