MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1e344453ec1208b7fc9fe96377eb47de4ef9162c7cdc0e56bee82a52e42a3856. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments

SHA256 hash: 1e344453ec1208b7fc9fe96377eb47de4ef9162c7cdc0e56bee82a52e42a3856
SHA3-384 hash: 950f78c0b726827b518aa7afc006f3de87d33741b4f7b2dc82a39eb539cde9a06426ae86e407494c86144c5e61a38a01
SHA1 hash: 07406951ccb10009e818ee1cbc5dbbbf871f7f1d
MD5 hash: 611c114195dae79f6a7353f706f8077b
humanhash: london-vermont-lake-missouri
File name:LisectAVT_2403002A_500.exe
Download: download sample
Signature Amadey
File size:5'187'511 bytes
First seen:2024-07-25 00:44:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ae9f6a32bb8b03dce37903edbc855ba1 (28 x CryptOne, 18 x RedLineStealer, 15 x njrat)
ssdeep 98304:9ayPd4hW/JfMkTQmWPKql6M96BRqchrx91hDORM7seCKaZSwWyQ+kivmjw3:9FJRkm6Kql6MMBRqchrx9ktBZ78jw
TLSH T14E36339577829471D93225740E7BABB14F383C501B39A9CF9708343E2B32AD1A6367B7
TrID 80.5% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
9.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
3.1% (.EXE) Win64 Executable (generic) (10523/12/4)
1.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 0df8a0acf0c6f3e0 (2 x AsyncRAT, 2 x Amadey, 1 x Formbook)
Reporter Anonymous
Tags:Amadey exe


Avatar
Anonymous
this malware sample is very nasty!

Intelligence


File Origin
# of uploads :
1
# of downloads :
262
Origin country :
CN CN
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a file
Launching the default Windows debugger (dwwin.exe)
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
91%
Tags:
epmicrosoft_visual_cc evasive fingerprint installer lolbin lolbin microsoft_visual_cc overlay packed packed remote setupapi shdocvw shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, DarkTortilla
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.DarkTortilla
Status:
Malicious
First seen:
2024-07-25 00:45:13 UTC
File Type:
PE (Exe)
Extracted files:
166
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:54a870 discovery infostealer trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Amadey
RedLine
RedLine payload
Malware Config
C2 Extraction:
http://topgamecheats.dev
Unpacked files
SH256 hash:
2590c93daae935bcfd2b5a947e9013834d50a2d658fa1c9ef2d0d1be9df94eb8
MD5 hash:
a5b4e8ad9348e5804151321458cccd20
SHA1 hash:
bb1221c5069e8cba88792a073d58c545928c3a2b
SH256 hash:
cfb6ea32d8b66f1904a443b6545bcd55dac8f723f40c97ca4401966a8763d560
MD5 hash:
d13c27efddca1ee2e4a462497e1529c1
SHA1 hash:
f4fbf7738696a463bd9b24eb12613a936ea012bc
SH256 hash:
56aaa2b9e53d69dd75c8d1247220d8ea97b1b7705796b2e2ddff34c7eea8adee
MD5 hash:
50f28d178452b2db4e1f466904e55c78
SHA1 hash:
d9a3246a570715d756a6c653b6818afb99ae39ec
SH256 hash:
0781f74db6c9ff7aa0c1e76dd0ebc4a9575fba6caca9aac9fb0131c5a73c84be
MD5 hash:
2c064163cda2f093cf6d20302481dff7
SHA1 hash:
cf948b10d999c369ef51972f86278a4f536d400d
SH256 hash:
2db82e9b91b1ccb1957b4e06ec49bfb0096e973213fc1786de1bbe3162f5df5a
MD5 hash:
27dea42a70bd7e948f1171ce873878a1
SHA1 hash:
b87051d51479c093cdf3e721acea4fd8b940b1e5
SH256 hash:
914833701a6c3629daa57c058df3f17742432a868e405b04f94714aa86ab6986
MD5 hash:
dfc6f7523d815ce5ebfa96c0b4d0a054
SHA1 hash:
0f96ceb4e84f538c0d9df5d7c3184e2916519566
SH256 hash:
bbe53788c93f1feb8c52908d74ae463d58addef354242fb4bfa423560ea82458
MD5 hash:
27499cf0e73817392b9f50cc9e82c2b3
SHA1 hash:
a0efab9cdb4b2a4a920f4ab76095d24806d7812f
SH256 hash:
5a614fcf9d2109353fca5ee34c9d13b26bea6a3077a8c94a71d44dfe63e7f3f1
MD5 hash:
17d48493fc742f56516d2a81cdeb5e3c
SHA1 hash:
581b71a135c794722221d6566ab5c34df1a4d221
SH256 hash:
1e344453ec1208b7fc9fe96377eb47de4ef9162c7cdc0e56bee82a52e42a3856
MD5 hash:
611c114195dae79f6a7353f706f8077b
SHA1 hash:
07406951ccb10009e818ee1cbc5dbbbf871f7f1d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Amadey

Executable exe 1e344453ec1208b7fc9fe96377eb47de4ef9162c7cdc0e56bee82a52e42a3856

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments