MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4326cdbae0a4b8d8fc9a8c6fd24557dbc0d6407299eb8e6600ed4075e5b29ddd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 5 File information Comments

SHA256 hash: 4326cdbae0a4b8d8fc9a8c6fd24557dbc0d6407299eb8e6600ed4075e5b29ddd
SHA3-384 hash: 295260622bfc1ce8eecbe68193cf760f136c64bc97ff912798ef2abebc2a6efb1f41e611c5187833093c0f371dda67fb
SHA1 hash: 3f7e5dbc8849f89b125be2ec0cb78456ef394c45
MD5 hash: f1d68439e46ff4a4fb083dc89933f472
humanhash: early-north-sad-south
File name:random.exe
Download: download sample
Signature Amadey
File size:271'872 bytes
First seen:2025-07-06 17:41:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 6144:S2tTCjxB0mm0yY9oS9hPNNxsGsqIqb4ePO3wgMthlAAOOsyRGQ9:Ar0mm0yp+x2LqbnGgPWqs9Q9
TLSH T16644138DB7CC0933F254D67C7FE5E91249B06789B210FBEAE42C7229A52B771015BA43
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
144.172.91.41:8805

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
144.172.91.41:8805 https://threatfox.abuse.ch/ioc/1552731/

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
rl_4326cdbae0a4b8d8fc9a8c6fd24557dbc0d6407299eb8e6600ed4075e5b29ddd
Verdict:
Malicious activity
Analysis date:
2025-07-06 17:51:05 UTC
Tags:
amadey botnet stealer loader rdp stealc telegram vidar netreactor purehvnc screenconnect rmm-tool lumma smokeloader auto-reg evasion auto-startup gcleaner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
infosteal vmdetect autorun emotet
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
base64 packed packed packer_detected
Result
Threat name:
ScreenConnect Tool, Amadey, BitCoin Mine
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Compiles code for process injection (via .Net compiler)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Enables network access during safeboot for specific services
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies security policies related information
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Possible COM Object hijacking
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sets debug register (to hijack the execution of another thread)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potential Crypto Mining Activity
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: Xmrig
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected AntiVM5
Yara detected BitCoin Miner
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected SilentXMRMiner
Yara detected Stealc v2
Yara detected Stealerium
Yara detected Telegram Recon
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1729597 Sample: random.exe Startdate: 06/07/2025 Architecture: WINDOWS Score: 100 173 api.telegram.org 2->173 175 t.me 2->175 177 6 other IPs or domains 2->177 225 Sigma detected: Xmrig 2->225 227 Suricata IDS alerts for network traffic 2->227 229 Found malware configuration 2->229 233 34 other signatures 2->233 13 suker.exe 4 46 2->13         started        18 random.exe 2 2->18         started        20 msiexec.exe 2->20         started        22 9 other processes 2->22 signatures3 231 Uses the Telegram API (likely for C&C communication) 173->231 process4 dnsIp5 191 176.46.157.50, 49714, 49717, 49723 ESTPAKEE Iran (ISLAMIC Republic Of) 13->191 193 176.46.157.32, 49719, 49725, 49729 ESTPAKEE Iran (ISLAMIC Republic Of) 13->193 195 66.63.187.164, 49736, 80 ASN-QUADRANET-GLOBALUS United States 13->195 147 C:\Users\user\AppData\...\28562ea456.exe, PE32 13->147 dropped 149 C:\Users\user\AppData\...\01da3d5f34.exe, PE32+ 13->149 dropped 151 C:\Users\user\AppData\Local\...\QpKuKKY.exe, PE32 13->151 dropped 159 17 other malicious files 13->159 dropped 317 Contains functionality to start a terminal service 13->317 24 UXN3LKe.exe 13->24         started        27 v999f8.exe 13->27         started        29 QvG0bbo.exe 13->29         started        40 6 other processes 13->40 161 2 other malicious files 18->161 dropped 319 Suspicious powershell command line found 18->319 321 Bypasses PowerShell execution policy 18->321 32 cmd.exe 1 18->32         started        34 powershell.exe 37 18->34         started        36 cmd.exe 1 18->36         started        153 C:\Windows\Installer\MSIF1B8.tmp, PE32 20->153 dropped 155 C:\Windows\Installer\MSIE41B.tmp, PE32 20->155 dropped 157 C:\Windows\Installer\MSIDCB6.tmp, PE32 20->157 dropped 163 10 other malicious files 20->163 dropped 323 Enables network access during safeboot for specific services 20->323 325 Modifies security policies related information 20->325 197 127.0.0.1 unknown unknown 22->197 327 Multi AV Scanner detection for dropped file 22->327 329 Changes security center settings (notifications, updates, antivirus, firewall) 22->329 331 Writes to foreign memory regions 22->331 333 3 other signatures 22->333 38 conhost.exe 22->38         started        43 2 other processes 22->43 file6 signatures7 process8 dnsIp9 257 Antivirus detection for dropped file 24->257 259 Multi AV Scanner detection for dropped file 24->259 275 2 other signatures 24->275 45 conhost.exe 24->45         started        277 2 other signatures 27->277 49 MSBuild.exe 27->49         started        52 MSBuild.exe 27->52         started        199 144.172.91.41, 49735, 8805 HOSTFLYTE-NETWORKSCA United States 29->199 261 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->261 279 2 other signatures 29->279 56 3 other processes 29->56 263 Uses schtasks.exe or at.exe to add and modify task schedules 32->263 58 2 other processes 32->58 265 Loading BitLocker PowerShell Module 34->265 54 conhost.exe 34->54         started        60 2 other processes 36->60 267 Adds a directory exclusion to Windows Defender 38->267 62 3 other processes 38->62 201 api.telegram.org 149.154.167.220, 443, 49728 TELEGRAMRU United Kingdom 40->201 203 196.251.86.10 SONIC-WirelessZA Seychelles 40->203 205 2 other IPs or domains 40->205 133 C:\Users\user\AppData\Local\...\nudwee.exe, PE32 40->133 dropped 269 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 40->269 271 Hijacks the control flow in another process 40->271 281 8 other signatures 40->281 64 4 other processes 40->64 273 Contains functionality to start a terminal service 43->273 file10 signatures11 process12 dnsIp13 143 C:\Users\user\AppData\...\services64.exe, PE32+ 45->143 dropped 293 Adds a directory exclusion to Windows Defender 45->293 66 cmd.exe 45->66         started        68 cmd.exe 45->68         started        71 cmd.exe 45->71         started        165 t.me 149.154.167.99 TELEGRAMRU United Kingdom 49->165 167 b1.a.exifit.ir 91.99.174.2 PARSONLINETehran-IRANIR Iran (ISLAMIC Republic Of) 49->167 295 Encrypted powershell cmdline option found 49->295 297 Tries to harvest and steal browser information (history, passwords, etc) 49->297 73 powershell.exe 49->73         started        81 3 other processes 49->81 169 192.168.2.4, 3333, 443, 49710 unknown unknown 56->169 299 Installs a global keyboard hook 56->299 76 chrome.exe 56->76         started        145 C:\Users\user\AppData\Local\...\suker.exe, PE32 58->145 dropped 301 Contains functionality to inject code into remote processes 58->301 79 suker.exe 58->79         started        303 Writes to foreign memory regions 62->303 305 Allocates memory in foreign processes 62->305 307 Creates a thread in another existing process (thread injection) 62->307 309 Found direct / indirect Syscall (likely to bypass EDR) 62->309 83 5 other processes 62->83 171 185.209.21.30, 49733, 80 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 64->171 311 Multi AV Scanner detection for dropped file 64->311 313 Contains functionality to start a terminal service 64->313 85 4 other processes 64->85 file14 315 Detected Stratum mining protocol 169->315 signatures15 process16 dnsIp17 87 services64.exe 66->87         started        90 conhost.exe 66->90         started        235 Adds a directory exclusion to Windows Defender 68->235 92 powershell.exe 68->92         started        94 powershell.exe 68->94         started        96 conhost.exe 68->96         started        103 2 other processes 71->103 135 C:\Users\user\AppData\Local\...\nwvxbazj.0.cs, Unicode 73->135 dropped 237 Writes to foreign memory regions 73->237 98 conhost.exe 73->98         started        185 clients2.googleusercontent.com 76->185 187 apis.google.com 76->187 189 5 other IPs or domains 76->189 239 Multi AV Scanner detection for dropped file 79->239 241 Contains functionality to start a terminal service 79->241 137 C:\Users\user\AppData\...\pzs0uxkl.cmdline, Unicode 81->137 dropped 243 Installs a global keyboard hook 81->243 100 csc.exe 81->100         started        105 2 other processes 81->105 245 Loading BitLocker PowerShell Module 83->245 file18 signatures19 process20 dnsIp21 247 Writes to foreign memory regions 87->247 249 Allocates memory in foreign processes 87->249 251 Creates a thread in another existing process (thread injection) 87->251 108 conhost.exe 87->108         started        253 Compiles code for process injection (via .Net compiler) 92->253 255 Loading BitLocker PowerShell Module 92->255 131 C:\Users\user\AppData\Local\...\pzs0uxkl.dll, PE32 100->131 dropped 112 cvtres.exe 100->112         started        181 142.251.35.164 GOOGLEUS United States 105->181 183 www.google.com 105->183 file22 signatures23 process24 file25 139 C:\Users\user\AppData\...\sihost64.exe, PE32+ 108->139 dropped 141 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 108->141 dropped 285 Found strings related to Crypto-Mining 108->285 287 Injects code into the Windows Explorer (explorer.exe) 108->287 289 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 108->289 291 5 other signatures 108->291 114 sihost64.exe 108->114         started        117 explorer.exe 108->117         started        120 cmd.exe 108->120         started        signatures26 process27 dnsIp28 207 Multi AV Scanner detection for dropped file 114->207 209 Writes to foreign memory regions 114->209 211 Allocates memory in foreign processes 114->211 213 Creates a thread in another existing process (thread injection) 114->213 122 conhost.exe 114->122         started        179 omega.fechrise.fun 89.23.112.83, 3333, 49731 MAXITEL-ASRU Russian Federation 117->179 215 System process connects to network (likely due to code injection or exploit) 117->215 217 Query firmware table information (likely to detect VMs) 117->217 219 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 117->219 221 Adds a directory exclusion to Windows Defender 120->221 124 powershell.exe 120->124         started        127 powershell.exe 120->127         started        129 conhost.exe 120->129         started        signatures29 223 Detected Stratum mining protocol 179->223 process30 signatures31 283 Loading BitLocker PowerShell Module 124->283
Verdict:
inconclusive
YARA:
7 match(es)
Tags:
.Net Executable PE (Portable Executable) SOS: 0.02 Win 32 Exe x86
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-07-06 17:42:29 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:donutloader family:gurcu family:lumma family:quasar family:stealerium family:vidar family:xmrig family:xworm botnet:6ba07e05801c4c8c8f765cb08db1a3b2 botnet:9fa1e2 collection credential_access cryptone defense_evasion discovery execution loader miner packer persistence privilege_escalation rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies registry key
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
AutoIT Executable
Boot or Logon Autostart Execution: Authentication Package
Drops file in System32 directory
Enumerates processes with tasklist
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Obfuscated Files or Information: Command Obfuscation
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Sets service image path in registry
Stops running service(s)
Uses browser remote debugging
CryptOne packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner payload
Amadey
Amadey family
Detect Vidar Stealer
Detect Xworm Payload
Detects DonutLoader
DonutLoader
Donutloader family
Gurcu family
Gurcu, WhiteSnake
Lumma Stealer, LummaC
Lumma family
Quasar RAT
Quasar family
Quasar payload
Stealerium
Stealerium family
Vidar
Vidar family
Xmrig family
Xworm
Xworm family
xmrig
Malware Config
C2 Extraction:
http://176.46.157.50
https://api.telegram.org/bot7752834125:AAGPH6QjjPzlEZfKnQiq_KUoE4sQVU5i15o/sendMessage?chat_id=
https://rbmlh.xyz/lakd
https://ycvduc.xyz/trie
https://nbcsfar.xyz/tpxz
https://cbakk.xyz/ajng
https://trsuv.xyz/gait
https://sqgzl.xyz/taoa
https://cexpxg.xyz/airq
https://urarfx.xyz/twox
https://liaxn.xyz/nbzh
https://t.me/g0e7qx
https://steamcommunity.com/profiles/76561199874190020
66.63.187.164:8594
https://api.telegram.org/bot7752834125:AAGPH6QjjPzlEZfKnQiq_KUoE4sQVU5i15o/getM
Unpacked files
SH256 hash:
4326cdbae0a4b8d8fc9a8c6fd24557dbc0d6407299eb8e6600ed4075e5b29ddd
MD5 hash:
f1d68439e46ff4a4fb083dc89933f472
SHA1 hash:
3f7e5dbc8849f89b125be2ec0cb78456ef394c45
SH256 hash:
fdc87c699e962ee2974b30ea72c45b2c6426a9fc4af5d0e068291aeba11f80eb
MD5 hash:
472a85a1f2830d0c4867c425c4fd60f4
SHA1 hash:
a5c495a4a26978de91984b3c84744d3357211c77
Detections:
Amadey
SH256 hash:
93b52c63c8ea6e739cb32f1ccedcd96c0ed769e06a5fba5a1bdd5bbe9eb44999
MD5 hash:
a5e6484eef2b273591ad13582eb657de
SHA1 hash:
d9c52dfb831c575dca98eef953da8816da73db8e
Detections:
Amadey
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 4326cdbae0a4b8d8fc9a8c6fd24557dbc0d6407299eb8e6600ed4075e5b29ddd

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments