MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3aa57cd00e4a4096942c3b108934e697d2e3a485b0204f973fca5d80ee38f449. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 18


Intelligence 18 IOCs YARA 19 File information Comments

SHA256 hash: 3aa57cd00e4a4096942c3b108934e697d2e3a485b0204f973fca5d80ee38f449
SHA3-384 hash: ed4208d988ab398f65b97d99ce805e5fe64dc858d8ba20506c7b608abe7cd03961eda19380a3d7be016d5063fbb1dbac
SHA1 hash: 4a99c09e7f072db0087d67689fd7d1135beaec45
MD5 hash: 6e9e65685e1c491d9720df0a4d7d2a62
humanhash: october-hotel-hamper-fifteen
File name:HQ Proxy Leecher.exe
Download: download sample
Signature Amadey
File size:6'718'464 bytes
First seen:2025-05-29 14:05:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 223f8057932cb61043b0989210626737 (6 x Amadey, 4 x SVCStealer, 4 x RedLineStealer)
ssdeep 196608:Zkl7q3DBWWaLgS8DWwsCJIRYLv7U+bm/SKg:+lQecS8DWiXLYEdP
Threatray 4 similar samples on MalwareBazaar
TLSH T18666F0157A6190BCC063947485465E76EF317C264B609AEB06A0CA3E3FBB6E15E3F730
TrID 44.9% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.1% (.EXE) Win64 Executable (generic) (10522/11/4)
14.4% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.4% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon f0c8e1c0c081a0c0 (1 x Amadey)
Reporter aachum
Tags:Amadey b8c4ef exe


Avatar
iamaachum
Amadey Botnet: b8c4ef
Amadey C2: http://185.156.72.8/rob75u9v/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
447
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
HQProxyLeecher.exe
Verdict:
Malicious activity
Analysis date:
2025-05-19 18:11:56 UTC
Tags:
amadey botnet stealer rust confuser rdp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
phishing autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Сreating synchronization primitives
Creating a process from a recently created file
Reading critical registry keys
Creating a file in the %temp% subdirectories
Creating a window
Creating a file
Searching for synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Launching a process
Searching for the window
Using the Windows Management Instrumentation requests
Creating a file in the system32 directory
Enabling the 'hidden' option for recently created files
Creating a file in the Windows directory
Unauthorized injection to a recently created process
Connection attempt to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 clipbanker cmd confuserex expand fingerprint lolbin microsoft_visual_cc net netsh obfuscated packed packed packer_detected redline wmic
Result
Threat name:
Amadey, MicroClip, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Detected generic credential text file
Drops executables to the windows directory (C:\Windows) and starts them
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Sigma detected: Powershell launch regsvr32
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected MicroClip
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1701557 Sample: HQ Proxy Leecher.exe Startdate: 29/05/2025 Architecture: WINDOWS Score: 100 163 Suricata IDS alerts for network traffic 2->163 165 Found malware configuration 2->165 167 Malicious sample detected (through community Yara rule) 2->167 169 15 other signatures 2->169 14 HQ Proxy Leecher.exe 6 2->14         started        18 nudwee.exe 2->18         started        20 svchost.exe 2->20         started        23 nudwee.exe 2->23         started        process3 dnsIp4 147 C:\Users\user\AppData\Roaming\vxcvxcvcx.exe, PE32+ 14->147 dropped 149 C:\Users\user\AppData\...\fsdfsdfsdf.exe, PE32 14->149 dropped 151 C:\Users\user\AppData\...\erezrzerze.exe, PE32+ 14->151 dropped 153 2 other malicious files 14->153 dropped 217 Contains functionality to start a terminal service 14->217 25 fsdfsdfsdf.exe 2 14->25         started        28 erezrzerze.exe 91 14->28         started        32 cxwcwxs.exe 4 14->32         started        34 2 other processes 14->34 219 Multi AV Scanner detection for dropped file 18->219 157 127.0.0.1 unknown unknown 20->157 file5 signatures6 process7 dnsIp8 119 C:\Users\user\AppData\...\fsdfsdfsdf.tmp, PE32 25->119 dropped 36 fsdfsdfsdf.tmp 3 5 25->36         started        159 185.156.72.8, 49697, 49698, 49703 ITDELUXE-ASRU Russian Federation 28->159 161 62.60.226.191, 49699, 80 ASLINE-AS-APASLINELIMITEDHK Iran (ISLAMIC Republic Of) 28->161 121 C:\Users\user\AppData\Local\...\temp_630.exe, PE32+ 28->121 dropped 123 C:\Users\user\AppData\Local\...\temp_620.exe, PE32+ 28->123 dropped 125 C:\Users\user\AppData\Local\...\temp_614.exe, PE32+ 28->125 dropped 129 8 other malicious files 28->129 dropped 207 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 28->207 209 Tries to steal Crypto Currency Wallets 28->209 211 Detected generic credential text file 28->211 39 temp_620.exe 28->39         started        41 temp_610.exe 28->41         started        44 temp_614.exe 28->44         started        48 3 other processes 28->48 127 C:\Users\user\AppData\Local\...\nudwee.exe, PE32 32->127 dropped 213 Contains functionality to start a terminal service 32->213 215 Contains functionality to inject code into remote processes 32->215 46 nudwee.exe 32->46         started        file9 signatures10 process11 file12 101 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 36->101 dropped 103 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 36->103 dropped 50 fsdfsdfsdf.exe 2 36->50         started        105 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 39->105 dropped 107 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 39->107 dropped 117 48 other malicious files 39->117 dropped 53 temp_620.exe 39->53         started        109 C:\Windows\sysrtlcw.exe, PE32+ 41->109 dropped 111 C:\Windows\System32\sysmanger.exe, PE32+ 41->111 dropped 113 C:\Users\user\AppData\...\sysmrdrv.exe, PE32+ 41->113 dropped 183 Creates multiple autostart registry keys 41->183 185 Creates an autostart registry key pointing to binary in C:\Windows 41->185 187 Found direct / indirect Syscall (likely to bypass EDR) 41->187 55 sysmanger.exe 41->55         started        115 C:\ProgramData\...\System_Info.txt, data 44->115 dropped 189 Tries to harvest and steal browser information (history, passwords, etc) 44->189 191 Tries to steal Crypto Currency Wallets 44->191 193 Detected generic credential text file 44->193 195 Contains functionality to start a terminal service 46->195 197 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 48->197 199 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 48->199 signatures13 process14 file15 91 C:\Users\user\AppData\...\fsdfsdfsdf.tmp, PE32 50->91 dropped 58 fsdfsdfsdf.tmp 3 5 50->58         started        179 Changes the view of files in windows explorer (hidden files and folders) 55->179 181 Found direct / indirect Syscall (likely to bypass EDR) 55->181 signatures16 process17 file18 131 C:\Users\...\2XamlDiagnostics_3.pfx (copy), PE32+ 58->131 dropped 133 C:\Users\user\AppData\...\is-TVC3B.tmp, PE32+ 58->133 dropped 135 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 58->135 dropped 137 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 58->137 dropped 61 regsvr32.exe 58->61         started        process19 process20 63 regsvr32.exe 61->63         started        signatures21 221 Suspicious powershell command line found 63->221 223 Injects code into the Windows Explorer (explorer.exe) 63->223 225 Writes to foreign memory regions 63->225 227 3 other signatures 63->227 66 explorer.exe 63->66 injected 71 powershell.exe 63->71         started        73 powershell.exe 63->73         started        process22 dnsIp23 155 204.79.197.203, 443 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 66->155 93 C:\Users\user\AppData\Local\...950.tmp.exe, PE32+ 66->93 dropped 95 C:\Users\user\AppData\Local\...\AE5D.tmp.exe, PE32+ 66->95 dropped 97 C:\Users\user\AppData\Local\...\7255.tmp.exe, PE32+ 66->97 dropped 99 2 other malicious files 66->99 dropped 171 System process connects to network (likely due to code injection or exploit) 66->171 173 Benign windows process drops PE files 66->173 175 Drops executables to the windows directory (C:\Windows) and starts them 66->175 75 AE5D.tmp.exe 66->75         started        79 23A7.tmp.exe 66->79         started        81 E950.tmp.exe 66->81         started        87 4 other processes 66->87 177 Loading BitLocker PowerShell Module 71->177 83 conhost.exe 71->83         started        85 conhost.exe 73->85         started        file24 signatures25 process26 file27 139 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 75->139 dropped 141 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 75->141 dropped 143 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 75->143 dropped 145 47 other malicious files 75->145 dropped 201 Multi AV Scanner detection for dropped file 75->201 203 Drops executables to the windows directory (C:\Windows) and starts them 79->203 89 sysmanger.exe 79->89         started        205 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 81->205 signatures28 process29
Threat name:
Win64.Ransomware.RedLine
Status:
Malicious
First seen:
2025-05-17 20:51:24 UTC
File Type:
PE+ (Exe)
Extracted files:
112
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
svcstealer
Score:
  10/10
Tags:
family:amadey family:redline family:svcstealer botnet:b8c4ef botnet:ppvv discovery downloader execution infostealer persistence pyinstaller spyware stealer trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Detects Pyinstaller
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Command and Scripting Interpreter: PowerShell
Drops file in System32 directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Amadey
Amadey family
Detects SvcStealer Payload
RedLine
RedLine payload
Redline family
SvcStealer, Diamotrix
Svcstealer family
Malware Config
C2 Extraction:
176.113.115.149
185.81.68.156
62.60.226.191:1912
http://185.156.72.8
Verdict:
Malicious
Tags:
red_team_tool Win.Malware.Midie-10044502-0
YARA:
SUSP_NET_NAME_ConfuserEx
Unpacked files
SH256 hash:
3aa57cd00e4a4096942c3b108934e697d2e3a485b0204f973fca5d80ee38f449
MD5 hash:
6e9e65685e1c491d9720df0a4d7d2a62
SHA1 hash:
4a99c09e7f072db0087d67689fd7d1135beaec45
Detections:
Amadey
SH256 hash:
7d2c8e1b1a418d5cb0227edf0801302af1a2e8bbde1983f23b2b63f3f5f0a222
MD5 hash:
5ac225744987cca608539942658f00f8
SHA1 hash:
88e06ef7cacfeb34f4d635286a7df798f3bd2217
SH256 hash:
921dbd2fda49677c25ee0dbe0b5c646dd2b31d973161b148707ebf5aa78db570
MD5 hash:
3e06e418f438f814525c2bad5bb80028
SHA1 hash:
1dee58057566de624a545c2848ddd1687dbb844a
SH256 hash:
e3259748d2cd8e80b5a53f37c45ce2225d54f0291cf88acc36be8b50dace614f
MD5 hash:
a160657e3486492ba76934962550aa24
SHA1 hash:
ef7631451b7ff97f11ee119c0145a73e0e2b90bb
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_NET_NAME_ConfuserEx INDICATOR_EXE_Packed_ConfuserEx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:svc_stealer
Author:Nikolaos 'n0t' Totosis
Description:SVC Stealer Payload
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 3aa57cd00e4a4096942c3b108934e697d2e3a485b0204f973fca5d80ee38f449

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW

Comments