MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments 1

SHA256 hash: 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA3-384 hash: fe6c92ce24023921b82782e8bc557d4b2d32eeb1c0ef601674c7d6738115aff50ce07a4ab105f1e229f367532535388e
SHA1 hash: 003f768ffcc99bda5cda1fb966fda8625a8fdc3e
MD5 hash: 5086db99de54fca268169a1c6cf26122
humanhash: missouri-happy-uncle-dakota
File name:5086db99de54fca268169a1c6cf26122
Download: download sample
Signature Amadey
File size:241'152 bytes
First seen:2023-03-12 07:10:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ece97832960209c4f00f3aefed6c0555 (1 x Amadey)
ssdeep 6144:f36hrz456we4lz7zzZ5my2IuViMqJnyJQ:Pxpz7LmeuVi3nN
Threatray 4'002 similar samples on MalwareBazaar
TLSH T1FF341A217D16C031C56051B729B9BFF2C19DA8259BB049DB7B800F7BDA122E67A70E3D
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:32 Amadey exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
218
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
setup.exe
Verdict:
Malicious activity
Analysis date:
2023-03-11 16:29:43 UTC
Tags:
loader smoke trojan amadey rat redline stealer blackguard

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Adding an access-denied ACE
Creating a file in the %AppData% subdirectories
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
GetTempPath
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
amadey greyware shell32.dll
Result
Threat name:
Amadey, RHADAMANTHYS
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential ransomware demand text
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 824764 Sample: JlbJfLNR4d.exe Startdate: 12/03/2023 Architecture: WINDOWS Score: 100 76 Snort IDS alert for network traffic 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 Antivirus detection for URL or domain 2->80 82 15 other signatures 2->82 10 JlbJfLNR4d.exe 4 2->10         started        14 legenda.exe 2->14         started        16 PureHVNCFINAL.exe 2->16         started        18 PureHVNCFINAL.exe 2->18         started        process3 file4 64 C:\Users\user\AppData\Local\...\legenda.exe, PE32 10->64 dropped 66 C:\Users\user\...\legenda.exe:Zone.Identifier, ASCII 10->66 dropped 110 Contains functionality to inject code into remote processes 10->110 20 legenda.exe 33 10->20         started        signatures5 process6 dnsIp7 68 62.204.41.87, 49698, 49699, 49701 TNNET-ASTNNetOyMainnetworkFI United Kingdom 20->68 70 62.204.41.88, 49700, 49702, 49706 TNNET-ASTNNetOyMainnetworkFI United Kingdom 20->70 72 179.43.155.247, 49704, 80 PLI-ASCH Panama 20->72 56 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 20->56 dropped 58 C:\Users\user\AppData\...\PureHVNCFINAL.exe, PE32 20->58 dropped 60 C:\Users\user\AppData\Local\Temp\...\cc.exe, PE32 20->60 dropped 62 5 other malicious files 20->62 dropped 88 Multi AV Scanner detection for dropped file 20->88 90 Creates an undocumented autostart registry key 20->90 92 Machine Learning detection for dropped file 20->92 94 2 other signatures 20->94 25 cc.exe 20->25         started        28 PureHVNCFINAL.exe 1 20->28         started        30 cmd.exe 1 20->30         started        32 2 other processes 20->32 file8 signatures9 process10 signatures11 96 Detected unpacking (changes PE section rights) 25->96 98 Detected unpacking (overwrites its own PE header) 25->98 100 Machine Learning detection for dropped file 25->100 108 3 other signatures 25->108 34 dllhost.exe 25->34         started        102 Antivirus detection for dropped file 28->102 104 Multi AV Scanner detection for dropped file 28->104 106 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 28->106 37 PureHVNCFINAL.exe 28->37         started        40 explorer.exe 132 28->40         started        42 conhost.exe 30->42         started        44 cmd.exe 1 30->44         started        46 cmd.exe 1 30->46         started        50 4 other processes 30->50 48 conhost.exe 32->48         started        process12 dnsIp13 84 Tries to harvest and steal browser information (history, passwords, etc) 34->84 74 198.105.127.58, 49877, 80 ASDETUKhttpwwwheficedcomGB European Union 37->74 86 Tries to harvest and steal Bitcoin Wallet information 37->86 52 powershell.exe 37->52         started        signatures14 process15 process16 54 conhost.exe 52->54         started       
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2023-03-11 18:26:23 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
20 of 24 (83.33%)
Threat level:
  2/5
Result
Malware family:
rhadamanthys
Score:
  10/10
Tags:
family:amadey family:rhadamanthys collection persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses Microsoft Outlook profiles
Adds Run key to start application
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Modifies Installed Components in the registry
Amadey
Detect rhadamanthys stealer shellcode
Rhadamanthys
Malware Config
C2 Extraction:
62.204.41.87/joomla/index.php
Unpacked files
SH256 hash:
42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
MD5 hash:
5086db99de54fca268169a1c6cf26122
SHA1 hash:
003f768ffcc99bda5cda1fb966fda8625a8fdc3e
Detections:
Amadey
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 42873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-03-12 07:10:57 UTC

url : hxxp://62.204.41.87/lega.exe