MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b7b5bc7b0d1f70adf6b80390f1273723c409b837c9575ee1cd4b963cf9e5c7d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 13 File information Comments

SHA256 hash: 4b7b5bc7b0d1f70adf6b80390f1273723c409b837c9575ee1cd4b963cf9e5c7d
SHA3-384 hash: 0629723d4a3fe2db8310751f4974edd1ec048e3fe08a08cc8ab7e07ff150a4c75dd1206a60a0f41744cfd84761303540
SHA1 hash: d7fd20e2b2805883eb97bd383ccb24e8b62fea32
MD5 hash: 374fbd650936435626a9940406662ffd
humanhash: december-bakerloo-black-illinois
File name:4b7b5bc7b0d1f70adf6b80390f1273723c409b837c957.dll
Download: download sample
Signature Amadey
File size:1'875'616 bytes
First seen:2024-10-19 08:40:26 UTC
Last seen:2024-10-19 09:30:35 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 62c2063283081a40cbdddb8d33635f04 (1 x Amadey)
ssdeep 49152:zxx6EC4qHIDW+kEFYs8MW39W0CTvEtUAEo8:4ADWPEFYkWvyEtUAEo8
Threatray 3 similar samples on MalwareBazaar
TLSH T1B895AF01BC966D6DD96F223040AFD335AB390D154523DAF38BAAED71AE177127E4C30A
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10522/11/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter abuse_ch
Tags:Amadey dll


Avatar
abuse_ch
Amadey C2:
http://45.202.35.101/pLQvfD4d5/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://45.202.35.101/pLQvfD4d5/index.php https://threatfox.abuse.ch/ioc/1338039/

Intelligence


File Origin
# of uploads :
2
# of downloads :
432
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
Shellcode Dropper Exploit
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm evasive overlay packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl.evad.troj
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Bypasses PowerShell execution policy
Drops executables to the windows directory (C:\Windows) and starts them
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Drops script at startup location
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: TrustedPath UAC Bypass Pattern
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1537621 Sample: 4b7b5bc7b0d1f70adf6b80390f1... Startdate: 19/10/2024 Architecture: WINDOWS Score: 100 138 Malicious sample detected (through community Yara rule) 2->138 140 Multi AV Scanner detection for dropped file 2->140 142 Multi AV Scanner detection for submitted file 2->142 144 10 other signatures 2->144 10 loaddll32.exe 1 2->10         started        12 wscript.exe 2->12         started        15 svchost.exe 2->15         started        18 cmd.exe 2->18         started        process3 dnsIp4 20 rundll32.exe 39 10->20         started        25 cmd.exe 1 10->25         started        27 rundll32.exe 10->27         started        33 5 other processes 10->33 156 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->156 158 Suspicious execution chain found 12->158 29 rundll32.exe 12->29         started        126 184.28.90.27 AKAMAI-ASUS United States 15->126 128 127.0.0.1 unknown unknown 15->128 31 conhost.exe 18->31         started        signatures5 process6 dnsIp7 114 45.202.35.101 ONL-HKOCEANNETWORKLIMITEDHK Seychelles 20->114 116 104.21.83.56 CLOUDFLARENETUS United States 20->116 98 C:\Users\user\AppData\Roaming\...\Calibre.url, MS 20->98 dropped 100 C:\Users\user\...\firefox-proxy_1f1fbc18.cmd, ASCII 20->100 dropped 102 C:\Users\user\...\qxdhdis_81b507d8.cmd, ASCII 20->102 dropped 104 C:\Users\Public\...\CalibreLauncher.js, ASCII 20->104 dropped 150 System process connects to network (likely due to code injection or exploit) 20->150 35 cmd.exe 20->35         started        38 cmd.exe 20->38         started        152 Suspicious powershell command line found 25->152 154 Suspicious command line found 25->154 40 rundll32.exe 25->40         started        42 WerFault.exe 18 27->42         started        44 WerFault.exe 16 33->44         started        file8 signatures9 process10 signatures11 146 Suspicious powershell command line found 35->146 148 Suspicious command line found 35->148 46 powershell.exe 35->46         started        51 conhost.exe 35->51         started        53 cmd.exe 35->53         started        55 powershell.exe 38->55         started        57 conhost.exe 38->57         started        59 cmd.exe 38->59         started        61 WerFault.exe 22 16 40->61         started        process12 dnsIp13 118 154.216.19.187 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 46->118 106 C:\Windows \System32\MLANG.dll, PE32 46->106 dropped 108 C:\Users\user\AppData\Local\Temp\MLANG.dll, PE32+ 46->108 dropped 110 C:\Users\user\AppData\Roaming\SCV.cmd, ASCII 46->110 dropped 112 C:\Windows \System32\ComputerDefaults.exe, PE32 46->112 dropped 130 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 46->130 132 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 46->132 134 Suspicious powershell command line found 46->134 136 6 other signatures 46->136 63 cmd.exe 46->63         started        66 powershell.exe 46->66         started        68 powershell.exe 46->68         started        78 3 other processes 46->78 120 193.34.212.14 PL-SKYTECH-ASPL Poland 55->120 122 172.67.19.24 CLOUDFLARENETUS United States 55->122 70 powershell.exe 55->70         started        72 powershell.exe 55->72         started        74 powershell.exe 55->74         started        76 powershell.exe 55->76         started        124 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 61->124 file14 signatures15 process16 signatures17 160 Drops executables to the windows directory (C:\Windows) and starts them 63->160 80 conhost.exe 63->80         started        82 ComputerDefaults.exe 63->82         started        162 Loading BitLocker PowerShell Module 66->162 84 conhost.exe 66->84         started        86 conhost.exe 68->86         started        88 conhost.exe 70->88         started        90 conhost.exe 72->90         started        92 conhost.exe 74->92         started        94 conhost.exe 78->94         started        96 conhost.exe 78->96         started        process18
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
4b7b5bc7b0d1f70adf6b80390f1273723c409b837c9575ee1cd4b963cf9e5c7d
MD5 hash:
374fbd650936435626a9940406662ffd
SHA1 hash:
d7fd20e2b2805883eb97bd383ccb24e8b62fea32
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Reviews
IDCapabilitiesEvidence
FFI_METHODSCan perform system-level operations via FFI__ZN4core3ptr125drop_in_place$LT$$LP$std::sys::pal::windows::process::EnvKey$C$core::option::Option$LT$std::ffi::os_str::OsString$GT$$RP$$GT$17h73dc26da82086684E
__ZN4core3ptr137drop_in_place$LT$alloc::collections::btree::map::BTreeMap$LT$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$GT$$GT$17hcec53bd6c452cd07E
__ZN4core3ptr137drop_in_place$LT$alloc::collections::btree::map::IntoIter$LT$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$GT$$GT$17h7da144544f44ef8eE
__ZN4core3ptr165drop_in_place$LT$alloc::collections::btree::map::BTreeMap$LT$std::sys::pal::windows::process::EnvKey$C$core::option::Option$LT$std::ffi::os_str::OsString$GT$$GT$$GT$17h8b3e27132d4dd6a8E
__ZN4core3ptr165drop_in_place$LT$core::option::Option$LT$alloc::collections::btree::map::BTreeMap$LT$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$GT$$GT$$GT$17ha642b64a408c6866E
__ZN4core3ptr47drop_in_place$LT$std::ffi::os_str::OsString$GT$17h8fae3f70f24429f5E
__ZN4core3ptr70drop_in_place$LT$alloc::vec::Vec$LT$std::ffi::os_str::OsString$GT$$GT$17h60035baf2ea849bdE
__ZN4core3ptr84drop_in_place$LT$$LP$std::ffi::os_str::OsString$C$std::ffi::os_str::OsString$RP$$GT$17h34401c138aa2ec79E
__ZN4core3ptr97drop_in_place$LT$$LP$std::sys::pal::windows::process::EnvKey$C$std::ffi::os_str::OsString$RP$$GT$17h97196ce282a95e90E
__ZN81_$LT$std::ffi::os_str::OsString$u20$as$u20$std::os::windows::ffi::OsStringExt$GT$9from_wide17hdc9efc66b333cddcE
__ZN63_$LT$std::ffi::os_str::OsString$u20$as$u20$core::fmt::Write$GT$9write_str17h8f1d54f4ccd75a8aE
__ZN3std3ffi6os_str95_$LT$impl$u20$core::convert::TryFrom$LT$$RF$std::ffi::os_str::OsStr$GT$$u20$for$u20$$RF$str$GT$8try_from17he025517d493e8edeE
__ZN62_$LT$std::ffi::os_str::Display$u20$as$u20$core::fmt::Debug$GT$3fmt17he649da81f9104cbfE
__ZN64_$LT$std::ffi::os_str::Display$u20$as$u20$core::fmt::Display$GT$3fmt17hc3cc4eada3a65da3E
__ZN113_$LT$std::sys::pal::windows::process::EnvKey$u20$as$u20$core::convert::From$LT$std::ffi::os_str::OsString$GT$$GT$4from17h509086a2cd28f778E
__ZN3std3sys3pal7windows7process123_$LT$impl$u20$core::convert::From$LT$std::sys::pal::windows::process::EnvKey$GT$$u20$for$u20$std::ffi::os_str::OsString$GT$4from17h0f619327d28cb0cdE
__ZN114_$LT$std::sys::pal::windows::process::EnvKey$u20$as$u20$core::convert::From$LT$$RF$std::ffi::os_str::OsStr$GT$$GT$4from17h3c95c2f972843d4cE
__ZN111_$LT$std::sys::pal::windows::process::EnvKey$u20$as$u20$core::convert::AsRef$LT$std::ffi::os_str::OsStr$GT$$GT$6as_ref17h15c8d5e8204c6217E
__ZN60_$LT$std::ffi::os_str::OsStr$u20$as$u20$core::fmt::Debug$GT$3fmt17h4d7d3b354a567159E
__ZN63_$LT$std::ffi::os_str::OsString$u20$as$u20$core::fmt::Debug$GT$3fmt17h0848572f3c13ae83E
FILE_IO_READCan Read Files__ZN54_$LT$std::fs::Metadata$u20$as$u20$core::fmt::Debug$GT$3fmt17h1eaf3d7400e945a9E
__ZN75_$LT$std::fs::ReadDir$u20$as$u20$core::iter::traits::iterator::Iterator$GT$4next17he11c3b592e74d479E
FILE_IO_WRITECan Create and Remove Files__ZN79_$LT$alloc::vec::Vec$LT$u8$GT$$u20$as$u20$std::io::copy::BufferedWriterSpec$GT$11buffer_size17h61e0488a9a0c1416E
__ZN54_$LT$std::fs::DirEntry$u20$as$u20$core::fmt::Debug$GT$3fmt17hbc7de38410289d72E
__ZN54_$LT$std::fs::FileType$u20$as$u20$core::fmt::Debug$GT$3fmt17h952d7d0f1e5fdb48E
__ZN57_$LT$std::fs::Permissions$u20$as$u20$core::fmt::Debug$GT$3fmt17ha109a1167b9668afE
NET_METHODSUses Network to send and receive data__ZN104_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::convert::TryFrom$LT$$LP$$RF$str$C$u16$RP$$GT$$GT$8try_from17h10359e0cf6d6298aE
__ZN68_$LT$std::sys_common::net::TcpStream$u20$as$u20$core::fmt::Debug$GT$3fmt17h4d3b1a94432f981cE
__ZN70_$LT$std::sys_common::net::TcpListener$u20$as$u20$core::fmt::Debug$GT$3fmt17h2d50c59be6c7f566E
__ZN68_$LT$std::sys_common::net::UdpSocket$u20$as$u20$core::fmt::Debug$GT$3fmt17h54d957d155ca6b55E
__ZN91_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::iter::traits::iterator::Iterator$GT$4next17hcf8a98f24362d88dE
__ZN74_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::ops::drop::Drop$GT$4drop17h0bce93a28a176f18E
__ZN90_$LT$std::sys_common::net::LookupHost$u20$as$u20$core::convert::TryFrom$LT$$RF$str$GT$$GT$8try_from17h2ed26b71c21ccaaeE
__ZN3std10sys_common3net154_$LT$impl$u20$std::sys_common::IntoInner$LT$$LP$std::sys_common::net::SocketAddrCRepr$C$i32$RP$$GT$$u20$for$u20$$RF$core::net::socket_addr::SocketAddr$GT$10into_inner17hba16bcfed38906c4E

Comments