MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4b7b5bc7b0d1f70adf6b80390f1273723c409b837c9575ee1cd4b963cf9e5c7d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Amadey
Vendor detections: 11
| SHA256 hash: | 4b7b5bc7b0d1f70adf6b80390f1273723c409b837c9575ee1cd4b963cf9e5c7d |
|---|---|
| SHA3-384 hash: | 0629723d4a3fe2db8310751f4974edd1ec048e3fe08a08cc8ab7e07ff150a4c75dd1206a60a0f41744cfd84761303540 |
| SHA1 hash: | d7fd20e2b2805883eb97bd383ccb24e8b62fea32 |
| MD5 hash: | 374fbd650936435626a9940406662ffd |
| humanhash: | december-bakerloo-black-illinois |
| File name: | 4b7b5bc7b0d1f70adf6b80390f1273723c409b837c957.dll |
| Download: | download sample |
| Signature | Amadey |
| File size: | 1'875'616 bytes |
| First seen: | 2024-10-19 08:40:26 UTC |
| Last seen: | 2024-10-19 09:30:35 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 62c2063283081a40cbdddb8d33635f04 (1 x Amadey) |
| ssdeep | 49152:zxx6EC4qHIDW+kEFYs8MW39W0CTvEtUAEo8:4ADWPEFYkWvyEtUAEo8 |
| Threatray | 3 similar samples on MalwareBazaar |
| TLSH | T1B895AF01BC966D6DD96F223040AFD335AB390D154523DAF38BAAED71AE177127E4C30A |
| TrID | 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 12.7% (.EXE) Win64 Executable (generic) (10522/11/4) 7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.1% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| Reporter | |
| Tags: | Amadey dll |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://45.202.35.101/pLQvfD4d5/index.php | https://threatfox.abuse.ch/ioc/1338039/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Check_OutputDebugStringA_iat |
|---|
| Rule name: | command_and_control |
|---|---|
| Author: | CD_R0M_ |
| Description: | This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| FFI_METHODS | Can perform system-level operations via FFI | __ZN4core3ptr125drop_in_place$LT$$LP$std::sys::pal::windows::process::EnvKey$C$core::option::Option$LT$std::ffi::os_str::OsString$GT$$RP$$GT$17h73dc26da82086684E __ZN4core3ptr137drop_in_place$LT$alloc::collections::btree::map::BTreeMap$LT$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$GT$$GT$17hcec53bd6c452cd07E __ZN4core3ptr137drop_in_place$LT$alloc::collections::btree::map::IntoIter$LT$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$GT$$GT$17h7da144544f44ef8eE __ZN4core3ptr165drop_in_place$LT$alloc::collections::btree::map::BTreeMap$LT$std::sys::pal::windows::process::EnvKey$C$core::option::Option$LT$std::ffi::os_str::OsString$GT$$GT$$GT$17h8b3e27132d4dd6a8E __ZN4core3ptr165drop_in_place$LT$core::option::Option$LT$alloc::collections::btree::map::BTreeMap$LT$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$GT$$GT$$GT$17ha642b64a408c6866E __ZN4core3ptr47drop_in_place$LT$std::ffi::os_str::OsString$GT$17h8fae3f70f24429f5E __ZN4core3ptr70drop_in_place$LT$alloc::vec::Vec$LT$std::ffi::os_str::OsString$GT$$GT$17h60035baf2ea849bdE __ZN4core3ptr84drop_in_place$LT$$LP$std::ffi::os_str::OsString$C$std::ffi::os_str::OsString$RP$$GT$17h34401c138aa2ec79E __ZN4core3ptr97drop_in_place$LT$$LP$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$RP$$GT$17h97196ce282a95e90E __ZN81_$LT$std::ffi::os_str::OsString$u20$as$u20$std::os::windows::ffi::OsStringExt$GT$9from_wide17hdc9efc66b333cddcE __ZN63_$LT$std::ffi::os_str::OsString$u20$as$u20$core::fmt::Write$GT$9write_str17h8f1d54f4ccd75a8aE __ZN3std3ffi6os_str95_$LT$impl$u20$core::convert::TryFrom$LT$$RF$std::ffi::os_str::OsStr$GT$$u20$for$u20$$RF$str$GT$8try_from17he025517d493e8edeE __ZN62_$LT$std::ffi::os_str::Display$u20$as$u20$core::fmt::Debug$GT$3fmt17he649da81f9104cbfE __ZN64_$LT$std::ffi::os_str::Display$u20$as$u20$core::fmt::Display$GT$3fmt17hc3cc4eada3a65da3E __ZN113_$LT$std::sys::pal::windows::process::EnvKey$u20$as$u20$core::convert::From$LT$std::ffi::os_str::OsString$GT$$GT$4from17h509086a2cd28f778E __ZN3std3sys3pal7windows7process123_$LT$impl$u20$core::convert::From$LT$std::sys::pal::windows::process::EnvKey$GT$$u20$for$u20$std::ffi::os_str::OsString$GT$4from17h0f619327d28cb0cdE __ZN114_$LT$std::sys::pal::windows::process::EnvKey$u20$as$u20$core::convert::From$LT$$RF$std::ffi::os_str::OsStr$GT$$GT$4from17h3c95c2f972843d4cE __ZN111_$LT$std::sys::pal::windows::process::EnvKey$u20$as$u20$core::convert::AsRef$LT$std::ffi::os_str::OsStr$GT$$GT$6as_ref17h15c8d5e8204c6217E __ZN60_$LT$std::ffi::os_str::OsStr$u20$as$u20$core::fmt::Debug$GT$3fmt17h4d7d3b354a567159E __ZN63_$LT$std::ffi::os_str::OsString$u20$as$u20$core::fmt::Debug$GT$3fmt17h0848572f3c13ae83E |
| FILE_IO_READ | Can Read Files | __ZN54_$LT$std::fs::Metadata$u20$as$u20$core::fmt::Debug$GT$3fmt17h1eaf3d7400e945a9E __ZN75_$LT$std::fs::ReadDir$u20$as$u20$core::iter::traits::iterator::Iterator$GT$4next17he11c3b592e74d479E |
| FILE_IO_WRITE | Can Create and Remove Files | __ZN79_$LT$alloc::vec::Vec$LT$u8$GT$$u20$as$u20$std::io::copy::BufferedWriterSpec$GT$11buffer_size17h61e0488a9a0c1416E __ZN54_$LT$std::fs::DirEntry$u20$as$u20$core::fmt::Debug$GT$3fmt17hbc7de38410289d72E __ZN54_$LT$std::fs::FileType$u20$as$u20$core::fmt::Debug$GT$3fmt17h952d7d0f1e5fdb48E __ZN57_$LT$std::fs::Permissions$u20$as$u20$core::fmt::Debug$GT$3fmt17ha109a1167b9668afE |
| NET_METHODS | Uses Network to send and receive data | __ZN104_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::convert::TryFrom$LT$$LP$$RF$str$C$u16$RP$$GT$$GT$8try_from17h10359e0cf6d6298aE __ZN68_$LT$std::sys_common::net::TcpStream$u20$as$u20$core::fmt::Debug$GT$3fmt17h4d3b1a94432f981cE __ZN70_$LT$std::sys_common::net::TcpListener$u20$as$u20$core::fmt::Debug$GT$3fmt17h2d50c59be6c7f566E __ZN68_$LT$std::sys_common::net::UdpSocket$u20$as$u20$core::fmt::Debug$GT$3fmt17h54d957d155ca6b55E __ZN91_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::iter::traits::iterator::Iterator$GT$4next17hcf8a98f24362d88dE __ZN74_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::ops::drop::Drop$GT$4drop17h0bce93a28a176f18E __ZN90_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::convert::TryFrom$LT$$RF$str$GT$$GT$8try_from17h2ed26b71c21ccaaeE __ZN3std10sys_common3net154_$LT$impl$u20$std::sys_common::IntoInner$LT$$LP$std::sys_common::net::SocketAddrCRepr$C$i32$RP$$GT$$u20$for$u20$$RF$core::net::socket_addr::SocketAddr$GT$10into_inner17hba16bcfed38906c4E |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.