MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 30091615464738882fc3862ecbed13dfa0d194140aed3433d534d43d0ddb35a7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 30091615464738882fc3862ecbed13dfa0d194140aed3433d534d43d0ddb35a7
SHA3-384 hash: 7001267740de61091473b039814ea83d041421e187a0f9f29e5aa1decf1ed1fb02f72b8fdf286da59cc95072990d5c1d
SHA1 hash: d1934c28ead034bccfb61e0a326bed257ddc6ab4
MD5 hash: 54a069e5dbaf6d3b64afba6be02bf306
humanhash: minnesota-pennsylvania-bakerloo-four
File name:54a069e5dbaf6d3b64afba6be02bf306.exe
Download: download sample
Signature Amadey
File size:1'612'288 bytes
First seen:2023-10-29 19:40:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:6y/DGngQLaB2nl41HRrpjsQ0vOnO83XXE5geHeBrKK8fA86SiN0oAw04DG:B/DGFLnl+Mv6OkXXteo58PiN0d
Threatray 2'398 similar samples on MalwareBazaar
TLSH T1A4752362A3D96672D9F04B3024FB13D72E39B9615D704B2B17C4981B94F3BC1693B32A
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
194.49.94.11:80

Intelligence


File Origin
# of uploads :
1
# of downloads :
338
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Sending a custom TCP request
Launching a service
Сreating synchronization primitives
Creating a file
Creating a window
Launching cmd.exe command interpreter
Searching for synchronization primitives
Running batch commands
Adding an access-denied ACE
Behavior that indicates a threat
Forced shutdown of a system process
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
89%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, RedLin
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1333914 Sample: 8FmcUr4p8k.exe Startdate: 29/10/2023 Architecture: WINDOWS Score: 100 197 Multi AV Scanner detection for domain / URL 2->197 199 Found malware configuration 2->199 201 Malicious sample detected (through community Yara rule) 2->201 203 20 other signatures 2->203 14 8FmcUr4p8k.exe 1 4 2->14         started        17 svchost.exe 2->17         started        process3 dnsIp4 169 C:\Users\user\AppData\Local\...\At8GB50.exe, PE32 14->169 dropped 171 C:\Users\user\AppData\Local\...\7vB5wS83.exe, PE32 14->171 dropped 20 At8GB50.exe 1 4 14->20         started        179 69.192.108.161 AKAMAI-ASUS United States 17->179 181 127.0.0.1 unknown unknown 17->181 file5 process6 file7 137 C:\Users\user\AppData\Local\...\Mf1lK35.exe, PE32 20->137 dropped 139 C:\Users\user\AppData\Local\...\6Lv9zm4.exe, PE32 20->139 dropped 221 Antivirus detection for dropped file 20->221 223 Multi AV Scanner detection for dropped file 20->223 225 Machine Learning detection for dropped file 20->225 24 Mf1lK35.exe 1 4 20->24         started        28 6Lv9zm4.exe 20->28         started        signatures8 process9 file10 161 C:\Users\user\AppData\Local\...\SJ7Xn65.exe, PE32 24->161 dropped 163 C:\Users\user\AppData\Local\...\5aC1DL2.exe, PE32 24->163 dropped 265 Antivirus detection for dropped file 24->265 267 Multi AV Scanner detection for dropped file 24->267 269 Machine Learning detection for dropped file 24->269 30 SJ7Xn65.exe 1 4 24->30         started        34 5aC1DL2.exe 24->34         started        signatures11 process12 file13 173 C:\Users\user\AppData\Local\...\wB6jY36.exe, PE32 30->173 dropped 175 C:\Users\user\AppData\Local\...\4cz640bi.exe, PE32 30->175 dropped 277 Antivirus detection for dropped file 30->277 279 Machine Learning detection for dropped file 30->279 36 wB6jY36.exe 1 4 30->36         started        39 4cz640bi.exe 30->39         started        177 C:\Users\user\AppData\Local\...\explothe.exe, PE32 34->177 dropped 42 gO8aZ7CU.exe 34->42         started        44 explothe.exe 34->44         started        signatures14 process15 dnsIp16 141 C:\Users\user\AppData\Local\...\xn7Wy43.exe, PE32 36->141 dropped 143 C:\Users\user\AppData\Local\...\3zT16cz.exe, PE32 36->143 dropped 47 3zT16cz.exe 36->47         started        50 xn7Wy43.exe 1 4 36->50         started        233 Writes to foreign memory regions 39->233 235 Allocates memory in foreign processes 39->235 237 Injects a PE file into a foreign processes 39->237 53 AppLaunch.exe 39->53         started        56 AppLaunch.exe 39->56         started        145 C:\Users\user\AppData\Local\...\yt6Sq5CF.exe, PE32 42->145 dropped 147 C:\Users\user\AppData\Local\...\3Ic6mf23.exe, PE32 42->147 dropped 239 Antivirus detection for dropped file 42->239 241 Machine Learning detection for dropped file 42->241 58 yt6Sq5CF.exe 42->58         started        193 77.91.124.1 ECOTEL-ASRU Russian Federation 44->193 149 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 44->149 dropped 151 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 44->151 dropped 243 Creates an undocumented autostart registry key 44->243 245 Uses schtasks.exe or at.exe to add and modify task schedules 44->245 60 cmd.exe 44->60         started        62 schtasks.exe 44->62         started        64 rundll32.exe 44->64         started        file17 signatures18 process19 dnsIp20 281 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 47->281 283 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 47->283 285 Maps a DLL or memory area into another process 47->285 289 2 other signatures 47->289 66 explorer.exe 68 31 47->66 injected 121 C:\Users\user\AppData\Local\...\2Iu4621.exe, PE32 50->121 dropped 123 C:\Users\user\AppData\Local\...\1QD54YE4.exe, PE32 50->123 dropped 71 1QD54YE4.exe 50->71         started        73 2Iu4621.exe 50->73         started        191 77.91.124.86 ECOTEL-ASRU Russian Federation 53->191 287 Found many strings related to Crypto-Wallets (likely being stolen) 53->287 125 C:\Users\user\AppData\Local\...\2gw562SI.exe, PE32 58->125 dropped 127 C:\Users\user\AppData\Local\...\1yy43ww7.exe, PE32 58->127 dropped 75 1yy43ww7.exe 58->75         started        77 2gw562SI.exe 58->77         started        79 conhost.exe 60->79         started        81 cmd.exe 60->81         started        85 5 other processes 60->85 83 conhost.exe 62->83         started        file21 signatures22 process23 dnsIp24 185 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 66->185 187 77.91.68.249 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 66->187 189 3 other IPs or domains 66->189 129 C:\Users\user\AppData\Local\TempAF3.exe, PE32 66->129 dropped 131 C:\Users\user\AppData\Local\Temp332.exe, PE32 66->131 dropped 133 C:\Users\user\AppData\Local\Temp\DD84.exe, PE32 66->133 dropped 135 9 other malicious files 66->135 dropped 205 System process connects to network (likely due to code injection or exploit) 66->205 207 Benign windows process drops PE files 66->207 87 D0FD.exe 66->87         started        91 DAD3.exe 66->91         started        93 D44A.exe 66->93         started        102 3 other processes 66->102 209 Contains functionality to inject code into remote processes 71->209 211 Writes to foreign memory regions 71->211 213 Allocates memory in foreign processes 71->213 95 AppLaunch.exe 9 1 71->95         started        215 Injects a PE file into a foreign processes 73->215 97 AppLaunch.exe 12 73->97         started        100 AppLaunch.exe 75->100         started        217 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 77->217 219 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 77->219 file25 signatures26 process27 dnsIp28 157 C:\Users\user\AppData\Local\...\tL4FB8Qm.exe, PE32 87->157 dropped 159 C:\Users\user\AppData\Local\...\6Tw69Iy.exe, PE32 87->159 dropped 247 Antivirus detection for dropped file 87->247 249 Multi AV Scanner detection for dropped file 87->249 251 Machine Learning detection for dropped file 87->251 104 tL4FB8Qm.exe 87->104         started        253 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 91->253 255 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 91->255 257 Tries to harvest and steal browser information (history, passwords, etc) 91->257 259 Modifies windows update settings 95->259 261 Disable Windows Defender notifications (registry) 95->261 263 Disable Windows Defender real time protection (registry) 95->263 183 193.233.255.73 FREE-NET-ASFREEnetEU Russian Federation 97->183 108 chrome.exe 102->108         started        111 conhost.exe 102->111         started        113 chrome.exe 102->113         started        115 chrome.exe 102->115         started        file29 signatures30 process31 dnsIp32 165 C:\Users\user\AppData\Local\...\KP2qM7wb.exe, PE32 104->165 dropped 167 C:\Users\user\AppData\Local\...\5KL33Wr.exe, PE32 104->167 dropped 271 Antivirus detection for dropped file 104->271 273 Multi AV Scanner detection for dropped file 104->273 275 Machine Learning detection for dropped file 104->275 117 KP2qM7wb.exe 104->117         started        195 239.255.255.250 unknown Reserved 108->195 file33 signatures34 process35 file36 153 C:\Users\user\AppData\Local\...\gO8aZ7CU.exe, PE32 117->153 dropped 155 C:\Users\user\AppData\Local\...\4JJ649SC.exe, PE32 117->155 dropped 227 Antivirus detection for dropped file 117->227 229 Multi AV Scanner detection for dropped file 117->229 231 Machine Learning detection for dropped file 117->231 signatures37
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2023-10-29 19:26:59 UTC
File Type:
PE (Exe)
Extracted files:
226
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:dcrat family:glupteba family:raccoon family:redline family:smokeloader family:xmrig family:zgrat botnet:6a6a005b9aa778f606280c5fa24ae595 botnet:@ytlogsbot botnet:grome botnet:kinza botnet:up3 backdoor collection discovery dropper evasion infostealer loader miner persistence rat spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Stops running service(s)
XMRig Miner payload
Amadey
DcRat
Detect ZGRat V1
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
Raccoon
Raccoon Stealer payload
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
ZGRat
xmrig
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
http://195.123.218.98:80
http://31.192.23
194.169.175.235:42691
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
f5992a864c353d48df3c6f3fdaa357b7c5d6c8f38c72750a9aae5da5e12fdd03
MD5 hash:
58349704c9f6bf7b548fbeb8acbd3e51
SHA1 hash:
6cc9b9653aa9e6f20356e352e3b0ba0b09ef44e4
SH256 hash:
cd20a11ff3290d358b87b821931e8bf0dc0f0c7c6dba1b775018678f42a62e26
MD5 hash:
6ebbd9ffb3b0aaed0f17b9a756b5a05f
SHA1 hash:
80270273cba0146c7205ae10054be0ad0aaa64f5
SH256 hash:
315b88e8fca2eadf9183a6b8f16e47508e5fd54d99bac371b6e18aa4a0a02518
MD5 hash:
9753afab16ceda8aef2ce3c94cff065a
SHA1 hash:
456b77e11074e3717f726e4a7fcb317e83474186
SH256 hash:
30091615464738882fc3862ecbed13dfa0d194140aed3433d534d43d0ddb35a7
MD5 hash:
54a069e5dbaf6d3b64afba6be02bf306
SHA1 hash:
d1934c28ead034bccfb61e0a326bed257ddc6ab4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 30091615464738882fc3862ecbed13dfa0d194140aed3433d534d43d0ddb35a7

(this sample)

  
Delivery method
Distributed via web download

Comments