MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 22a806962445c59de5d460b29a189a8e8539ee4870b5e403eb0c70d4711e8ad5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 22a806962445c59de5d460b29a189a8e8539ee4870b5e403eb0c70d4711e8ad5
SHA3-384 hash: 730b79f7ee59933bed784b2f2d66b25d004e80519aa0a8ed091563d6ad94302076f6fe29b8c547512e27ba942e0147c9
SHA1 hash: 936fa676aecffe7bc73eb3de3c5ef8f71c7a659e
MD5 hash: c8663a298e76e4d9d3937fb1822ad476
humanhash: cat-lake-east-kitten
File name:file
Download: download sample
Signature Amadey
File size:3'186'176 bytes
First seen:2024-11-05 13:43:28 UTC
Last seen:2024-11-05 15:21:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:kqa95kmCF916vVmo/dpo9yuD0EYixDDTI1A5QGh3JHn:kx9he91+VmOdp8yudYcEO5Q83JH
TLSH T1AEE54A62F44672CFC08A92F44057CD4A79AD9EB5872148C7B89CBAFABF62CC113B5D14
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:Amadey exe


Avatar
Bitsight
url: http://185.215.113.16/mine/random.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
421
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
da6390e0e3971f3acc3e14d20822d54fe6a893c4a00a588efafeff55240e4b2e
Verdict:
Malicious activity
Analysis date:
2024-11-05 13:29:40 UTC
Tags:
amadey botnet stealer loader stealc themida lumma possible-phishing exfiltration rust remote xworm

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect autorun autoit spam
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Creating a file
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Connection attempt to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
microsoft_visual_cc packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureCrypter, LummaC, Amadey, LummaC Stea, LummaC Stealer, XWorm
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected PureCrypter Trojan
Detected unpacking (changes PE section rights)
Drops PE files to the user root directory
Drops VBS files to the startup folder
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1549314 Sample: file.exe Startdate: 05/11/2024 Architecture: WINDOWS Score: 100 126 husktools.duckdns.org 2->126 128 bakedstusteeb.shop 2->128 130 61 other IPs or domains 2->130 154 Suricata IDS alerts for network traffic 2->154 156 Found malware configuration 2->156 158 Malicious sample detected (through community Yara rule) 2->158 162 25 other signatures 2->162 11 skotes.exe 4 34 2->11         started        16 file.exe 5 2->16         started        18 wscript.exe 2->18         started        20 5 other processes 2->20 signatures3 160 Uses dynamic DNS services 126->160 process4 dnsIp5 140 185.215.113.43, 49891, 49905, 49926 WHOLESALECONNECTIONSNL Portugal 11->140 142 husktools.duckdns.org 31.13.224.189, 49938, 49996, 7000 SARNICA-ASBG Bulgaria 11->142 144 2 other IPs or domains 11->144 108 C:\Users\user\AppData\...\ca201f8633.exe, PE32 11->108 dropped 110 C:\Users\user\AppData\...\8dcd877e15.exe, PE32 11->110 dropped 112 C:\Users\user\AppData\...\8da6fd7419.exe, PE32 11->112 dropped 118 11 other malicious files 11->118 dropped 208 Creates multiple autostart registry keys 11->208 210 Hides threads from debuggers 11->210 232 2 other signatures 11->232 22 xwo.exe 1 11->22         started        25 10dca837a3.exe 11->25         started        28 kiwi.exe 11->28         started        39 3 other processes 11->39 114 C:\Users\user\AppData\Local\...\skotes.exe, PE32 16->114 dropped 116 C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII 16->116 dropped 212 Detected unpacking (changes PE section rights) 16->212 214 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 16->214 216 Tries to evade debugger and weak emulator (self modifying code) 16->216 218 Tries to detect virtualization through RDTSC time measurements 16->218 31 skotes.exe 16->31         started        220 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->220 222 Windows Scripting host queries suspicious COM object (likely to drop second stage) 18->222 33 TypeId.exe 18->33         started        224 Query firmware table information (likely to detect VMs) 20->224 226 Tries to harvest and steal ftp login credentials 20->226 228 Tries to harvest and steal browser information (history, passwords, etc) 20->228 230 Tries to steal Crypto Currency Wallets 20->230 35 conhost.exe 20->35         started        37 conhost.exe 20->37         started        41 2 other processes 20->41 file6 signatures7 process8 dnsIp9 164 Multi AV Scanner detection for dropped file 22->164 166 Machine Learning detection for dropped file 22->166 180 2 other signatures 22->180 43 MSBuild.exe 1 7 22->43         started        47 conhost.exe 22->47         started        49 WerFault.exe 22->49         started        132 founpiuer.store 104.21.5.155 CLOUDFLARENETUS United States 25->132 168 Antivirus detection for dropped file 25->168 170 Detected unpacking (changes PE section rights) 25->170 172 Query firmware table information (likely to detect VMs) 25->172 182 4 other signatures 25->182 120 C:\Users\user\AppData\Roaming\TypeId.exe, PE32 28->120 dropped 122 C:\Users\user\AppData\Roaming\...\TypeId.vbs, ASCII 28->122 dropped 174 Drops VBS files to the startup folder 28->174 184 2 other signatures 28->184 51 InstallUtil.exe 28->51         started        176 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 31->176 186 2 other signatures 31->186 178 Injects a PE file into a foreign processes 33->178 53 InstallUtil.exe 33->53         started        134 185.215.113.206 WHOLESALECONNECTIONSNL Portugal 39->134 136 smithpropertysolutions.com 74.208.236.140, 49919, 80 ONEANDONE-ASBrauerstrasse48DE United States 39->136 138 127.0.0.1 unknown unknown 39->138 124 C:\ProgramData\chrome.dll, PE32 39->124 dropped 188 2 other signatures 39->188 55 taskkill.exe 39->55         started        57 taskkill.exe 39->57         started        59 taskkill.exe 39->59         started        61 2 other processes 39->61 file10 signatures11 process12 file13 102 C:\Users\user\AppData\Local\Temp\xlxacz.exe, PE32 43->102 dropped 104 C:\Users\user\AppData\Local\Temp\rfpbcm.exe, PE32 43->104 dropped 106 C:\Users\user\XClient.exe, PE32 43->106 dropped 190 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 43->190 192 Creates multiple autostart registry keys 43->192 194 Drops PE files to the user root directory 43->194 196 Uses schtasks.exe or at.exe to add and modify task schedules 43->196 63 xlxacz.exe 43->63         started        66 rfpbcm.exe 43->66         started        69 schtasks.exe 43->69         started        198 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 51->198 200 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 51->200 202 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 51->202 206 2 other signatures 51->206 204 Detected PureCrypter Trojan 53->204 71 conhost.exe 55->71         started        73 conhost.exe 57->73         started        75 conhost.exe 59->75         started        77 conhost.exe 61->77         started        signatures14 process15 file16 234 Found many strings related to Crypto-Wallets (likely being stolen) 63->234 236 Injects a PE file into a foreign processes 63->236 238 LummaC encrypted strings found 63->238 79 xlxacz.exe 63->79         started        83 WerFault.exe 63->83         started        86 conhost.exe 63->86         started        96 C:\Users\user\AppData\...\gxdcjnbfhdqn.nuts, PE32+ 66->96 dropped 88 cmd.exe 66->88         started        90 conhost.exe 69->90         started        signatures17 process18 dnsIp19 146 bakedstusteeb.shop 172.67.218.30 CLOUDFLARENETUS United States 79->146 148 Query firmware table information (likely to detect VMs) 79->148 150 Found many strings related to Crypto-Wallets (likely being stolen) 79->150 152 Tries to steal Crypto Currency Wallets 79->152 98 C:\ProgramData\Microsoft\...\Report.wer, Unicode 83->98 dropped 100 C:\Users\user\AppData\Local\...\foksdes.exe, PE32 88->100 dropped 92 conhost.exe 88->92         started        94 foksdes.exe 88->94         started        file20 signatures21 process22
Threat name:
Win32.Spyware.Stealc
Status:
Malicious
First seen:
2024-11-05 13:44:11 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:lumma family:stealc family:stormkitty family:xworm botnet:9c9aa5 botnet:tale discovery evasion persistence rat stealer trojan
Behaviour
Checks processor information in registry
Gathers network information
Kills process with taskkill
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
AutoIT Executable
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Windows security modification
Downloads MZ/PE file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Amadey family
Contains code to disable Windows Defender
Detect Xworm Payload
Lumma Stealer, LummaC
Lumma family
Modifies Windows Defender Real-time Protection settings
Stealc
Stealc family
StormKitty
StormKitty payload
Stormkitty family
Suspicious use of NtCreateUserProcessOtherParentProcess
Xworm
Xworm family
Malware Config
C2 Extraction:
http://185.215.113.43
http://185.215.113.206
https://founpiuer.store/api
https://bakedstusteeb.shop/api
https://worddosofrm.shop/api
https://mutterissuen.shop/api
https://standartedby.shop/api
https://nightybinybz.shop/api
https://conceszustyb.shop/api
https://respectabosiz.shop/api
https://moutheventushz.shop/api
husktools.duckdns.org:7000
127.0.0.1:8895
162.230.48.189:8895
Unpacked files
SH256 hash:
6c205450c581bbf012f4ce2e3944377e865887eb8011ed0351ecfaf1445c8b2f
MD5 hash:
e5867d114b61a91bb05a456180e90a57
SHA1 hash:
75e1dcbd6dde8257e9147948c3915e4d1f7c2699
Detections:
Amadey win_amadey
SH256 hash:
22a806962445c59de5d460b29a189a8e8539ee4870b5e403eb0c70d4711e8ad5
MD5 hash:
c8663a298e76e4d9d3937fb1822ad476
SHA1 hash:
936fa676aecffe7bc73eb3de3c5ef8f71c7a659e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 22a806962445c59de5d460b29a189a8e8539ee4870b5e403eb0c70d4711e8ad5

(this sample)

  
Dropped by
StealC
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments