MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 33e64fa63b61a442ab8620fa0958d9710fc1c6ddfd1e6467e7d6a437f2e463ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 17


Intelligence 17 IOCs YARA 1 File information Comments 1

SHA256 hash: 33e64fa63b61a442ab8620fa0958d9710fc1c6ddfd1e6467e7d6a437f2e463ac
SHA3-384 hash: bceb3fb02d323f77bafd062ae282b5b099eaf382832008ce25e8d48acc744f455d47da9f264aa03662195dbbe31fb3c7
SHA1 hash: 7dcdf92e2287e5500018da8520f7a124cf230d6e
MD5 hash: 1c35a928a9a67ca8067d0d74ebcd7621
humanhash: magnesium-autumn-double-lithium
File name:1c35a928a9a67ca8067d0d74ebcd7621
Download: download sample
Signature Amadey
File size:1'659'392 bytes
First seen:2023-11-02 09:06:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:mxHLKoIisbaGderQsQZ2rk1F/p7IV8Y8/IJQEn:2HLKoIbbTerwZ2ohwooQE
Threatray 2'564 similar samples on MalwareBazaar
TLSH T1D9752302A7DC9930EDF0277218F607A75B39BC615F64556B3328A8AC0DB77A5E830367
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter zbetcheckin
Tags:32 Amadey exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
355
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Launching a service
Sending a custom TCP request
Creating a file
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, RedLin
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1335889 Sample: 2Xol6A6H6r.exe Startdate: 02/11/2023 Architecture: WINDOWS Score: 100 144 Multi AV Scanner detection for domain / URL 2->144 146 Found malware configuration 2->146 148 Malicious sample detected (through community Yara rule) 2->148 150 18 other signatures 2->150 12 2Xol6A6H6r.exe 1 4 2->12         started        15 rundll32.exe 2->15         started        17 explothe.exe 2->17         started        process3 file4 126 C:\Users\user\AppData\Local\...\CJ3kA00.exe, PE32 12->126 dropped 128 C:\Users\user\AppData\Local\...\7hj5UF08.exe, PE32 12->128 dropped 19 CJ3kA00.exe 1 4 12->19         started        process5 file6 102 C:\Users\user\AppData\Local\...\cA9gu47.exe, PE32 19->102 dropped 104 C:\Users\user\AppData\Local\...\6cc9Av7.exe, PE32 19->104 dropped 176 Antivirus detection for dropped file 19->176 178 Multi AV Scanner detection for dropped file 19->178 180 Machine Learning detection for dropped file 19->180 23 cA9gu47.exe 1 4 19->23         started        signatures7 process8 file9 112 C:\Users\user\AppData\Local\...\BE8Xw41.exe, PE32 23->112 dropped 114 C:\Users\user\AppData\Local\...\5Dd3jd7.exe, PE32 23->114 dropped 182 Antivirus detection for dropped file 23->182 184 Machine Learning detection for dropped file 23->184 27 BE8Xw41.exe 1 4 23->27         started        31 5Dd3jd7.exe 23->31         started        signatures10 process11 file12 120 C:\Users\user\AppData\Local\...\Pk7DF53.exe, PE32 27->120 dropped 122 C:\Users\user\AppData\Local\...\4nd959ry.exe, PE32 27->122 dropped 198 Antivirus detection for dropped file 27->198 200 Multi AV Scanner detection for dropped file 27->200 202 Machine Learning detection for dropped file 27->202 33 Pk7DF53.exe 1 4 27->33         started        37 4nd959ry.exe 27->37         started        124 C:\Users\user\AppData\Local\...\explothe.exe, PE32 31->124 dropped 39 explothe.exe 31->39         started        signatures13 process14 dnsIp15 94 C:\Users\user\AppData\Local\...\qb6Ac01.exe, PE32 33->94 dropped 96 C:\Users\user\AppData\Local\...\3hN55fu.exe, PE32 33->96 dropped 152 Antivirus detection for dropped file 33->152 154 Multi AV Scanner detection for dropped file 33->154 156 Machine Learning detection for dropped file 33->156 42 qb6Ac01.exe 1 4 33->42         started        46 3hN55fu.exe 33->46         started        158 Writes to foreign memory regions 37->158 160 Allocates memory in foreign processes 37->160 162 Injects a PE file into a foreign processes 37->162 48 AppLaunch.exe 37->48         started        51 AppLaunch.exe 37->51         started        53 WerFault.exe 37->53         started        142 77.91.124.1 ECOTEL-ASRU Russian Federation 39->142 98 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 39->98 dropped 100 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 39->100 dropped 164 Creates an undocumented autostart registry key 39->164 166 Uses schtasks.exe or at.exe to add and modify task schedules 39->166 55 cmd.exe 39->55         started        57 schtasks.exe 39->57         started        59 rundll32.exe 39->59         started        file16 signatures17 process18 dnsIp19 116 C:\Users\user\AppData\Local\...\2QM0358.exe, PE32 42->116 dropped 118 C:\Users\user\AppData\Local\...\1hz48EH5.exe, PE32 42->118 dropped 186 Multi AV Scanner detection for dropped file 42->186 61 1hz48EH5.exe 42->61         started        64 2QM0358.exe 42->64         started        188 Antivirus detection for dropped file 46->188 190 Machine Learning detection for dropped file 46->190 192 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 46->192 196 3 other signatures 46->196 66 explorer.exe 46->66 injected 130 77.91.124.86 ECOTEL-ASRU Russian Federation 48->130 194 Tries to harvest and steal browser information (history, passwords, etc) 48->194 70 Conhost.exe 51->70         started        132 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 53->132 72 conhost.exe 55->72         started        74 cmd.exe 55->74         started        76 cacls.exe 55->76         started        80 4 other processes 55->80 78 conhost.exe 57->78         started        file20 signatures21 process22 dnsIp23 204 Contains functionality to inject code into remote processes 61->204 206 Writes to foreign memory regions 61->206 208 Allocates memory in foreign processes 61->208 82 AppLaunch.exe 9 1 61->82         started        85 WerFault.exe 21 16 61->85         started        210 Injects a PE file into a foreign processes 64->210 88 AppLaunch.exe 12 64->88         started        90 WerFault.exe 19 16 64->90         started        134 77.91.68.249 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 66->134 136 77.91.68.29 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 66->136 106 C:\Users\user\AppData\Local\Temp\7F3B.exe, PE32 66->106 dropped 108 C:\Users\user\AppData\Local\Temp\7D08.exe, PE32 66->108 dropped 110 C:\Users\user\AppData\Local\Temp\76AD.exe, PE32 66->110 dropped 212 System process connects to network (likely due to code injection or exploit) 66->212 214 Benign windows process drops PE files 66->214 92 rundll32.exe 66->92         started        file24 signatures25 process26 dnsIp27 168 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 82->168 170 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 82->170 172 Modifies windows update settings 82->172 174 2 other signatures 82->174 138 52.182.143.212 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 85->138 140 193.233.255.73 FREE-NET-ASFREEnetEU Russian Federation 88->140 signatures28
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-11-02 10:02:20 UTC
AV detection:
15 of 23 (65.22%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:dcrat family:redline family:smokeloader botnet:kedru botnet:plost backdoor evasion infostealer persistence rat trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Amadey
DcRat
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
http://77.91.124.1/theme/index.php
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
e57c090ebfb00c46238e30a02fd14ca328f77dd5e2b8977836fd7e206f141562
MD5 hash:
d978cd66de6ea2a90ee70247de2f3f04
SHA1 hash:
775887a85eac1cf6144cdd577c1bc51f52a0de8e
Detections:
win_smokeloader_a2
SH256 hash:
ff2a946989a8822123a07ccd295a225f64c82be662162f55a08e012571776d93
MD5 hash:
066f5b4bed0591afd5d51f2c87785dac
SHA1 hash:
bcf4c92b7892607d2f596e5c10aa60d18133ac3f
SH256 hash:
de512d5d864cf654255d943676d51598ff2e5fa52e2bc5b08b8acebb6c50931c
MD5 hash:
0f333f025c64069588c67cf449c94c54
SHA1 hash:
6366955cfc4c3275bfa7470ada959605b49fa11e
Detections:
Amadey win_amadey_auto
SH256 hash:
c5a4f849ea0b9bf0261147a236f1e1a43717f768d439a5a735ec84eccf24f66a
MD5 hash:
da4b5d697be96de02630d0a156723197
SHA1 hash:
170ba406026e8560c017c3c43212944e1715adcc
SH256 hash:
94ce5ec6ed5ace0e5fcff6cf00f3447ae9585589ad8c40c75f07a61d1f20aee3
MD5 hash:
38d673119dd61808885af8224de1de7f
SHA1 hash:
b2391bce6639384da01bfbc2a10a128187b92460
SH256 hash:
33e64fa63b61a442ab8620fa0958d9710fc1c6ddfd1e6467e7d6a437f2e463ac
MD5 hash:
1c35a928a9a67ca8067d0d74ebcd7621
SHA1 hash:
7dcdf92e2287e5500018da8520f7a124cf230d6e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 33e64fa63b61a442ab8620fa0958d9710fc1c6ddfd1e6467e7d6a437f2e463ac

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-11-02 09:06:44 UTC

url : hxxp://109.107.182.2/race/lom30.exe