MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57fe95c40d83f395bad243134a47ac8af1a322c7d246979562e2574036da5661. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 16


Intelligence 16 IOCs YARA 13 File information Comments

SHA256 hash: 57fe95c40d83f395bad243134a47ac8af1a322c7d246979562e2574036da5661
SHA3-384 hash: 81c6cd1780b6bf00f4b10684030f96f63506adb325185155e764b7723396c5f9250b344f45510c88beedbdd7f7e4c267
SHA1 hash: 6099ea6ef4fe0066c9d97822402878966026dae1
MD5 hash: 64f1d67b14dafea71c599e9c5498edc2
humanhash: bacon-beer-carolina-four
File name:CS-Cheat-Installer.exe
Download: download sample
Signature Amadey
File size:680'960 bytes
First seen:2023-08-27 17:07:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:plKxWCF+i/o4m8mMLkV4dz62TigPHRD/cYWqBGspdHtK:plKxWCP/oRMLDFpigPHlkYWpEH
Threatray 26 similar samples on MalwareBazaar
TLSH T1EBE412267B6F4A47C16904FE4F9311BC1B30DC3A698AD3476586B33D4EBA3C7852621E
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 4860f0f0b8a17204 (1 x Amadey)
Reporter vmovupd
Tags:Amadey exe


Avatar
vmovupd
C2: http://xyl.lat/2BfwEnWXSKj6KgTm/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
286
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
CS-Cheat-Installer.exe
Verdict:
Malicious activity
Analysis date:
2023-08-27 17:08:39 UTC
Tags:
amadey trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed packed smartassembly
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1298304 Sample: CS-Cheat-Installer.exe Startdate: 27/08/2023 Architecture: WINDOWS Score: 100 76 Found malware configuration 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 Antivirus detection for URL or domain 2->80 82 11 other signatures 2->82 12 CS-Cheat-Installer.exe 1 2->12         started        15 bstyoops.exe 2->15         started        17 bstyoops.exe 2->17         started        process3 signatures4 100 Contains functionality to inject code into remote processes 12->100 102 Injects a PE file into a foreign processes 12->102 19 CS-Cheat-Installer.exe 4 12->19         started        22 bstyoops.exe 15->22         started        24 bstyoops.exe 17->24         started        process5 file6 60 C:\Users\user\AppData\Local\...\bstyoops.exe, PE32 19->60 dropped 26 bstyoops.exe 1 19->26         started        process7 signatures8 84 Antivirus detection for dropped file 26->84 86 Multi AV Scanner detection for dropped file 26->86 88 Machine Learning detection for dropped file 26->88 90 2 other signatures 26->90 29 bstyoops.exe 19 26->29         started        process9 dnsIp10 72 37.139.129.124 LVLT-10753US Germany 29->72 74 8.8.8.8 GOOGLEUS United States 29->74 62 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 29->62 dropped 64 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 29->64 dropped 66 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 29->66 dropped 68 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 29->68 dropped 104 Creates an undocumented autostart registry key 29->104 34 rundll32.exe 29->34         started        36 cmd.exe 1 29->36         started        38 schtasks.exe 1 29->38         started        40 rundll32.exe 29->40         started        file11 signatures12 process13 process14 42 rundll32.exe 34->42         started        46 conhost.exe 36->46         started        48 cmd.exe 1 36->48         started        50 cmd.exe 1 36->50         started        54 4 other processes 36->54 52 conhost.exe 38->52         started        dnsIp15 70 104.248.239.160 DIGITALOCEAN-ASNUS United States 42->70 92 System process connects to network (likely due to code injection or exploit) 42->92 94 Tries to steal Instant Messenger accounts or passwords 42->94 96 Tries to harvest and steal ftp login credentials 42->96 98 Tries to harvest and steal browser information (history, passwords, etc) 42->98 56 tar.exe 42->56         started        signatures16 process17 process18 58 conhost.exe 56->58         started       
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-08-27 17:08:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
17 of 24 (70.83%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Amadey
Unpacked files
SH256 hash:
0e41ffd44bc8a085a3bd49058ff0051538476c8a05f086593b02bc87b30268dc
MD5 hash:
90e1482208611ebf4b36413d6bf05f42
SHA1 hash:
9e54348e958c9ecf2dc8a7b59ddc27489a0b5935
Detections:
Amadey
SH256 hash:
24ff7d28c2df70367db7b295d1b0093cd83cafbcb346fcba4a8c9f5cc2d3d6f9
MD5 hash:
9e22869e42c902e38824dc5a6d056319
SHA1 hash:
2eff2a6628fdeec5ed4eaec011ff9221509c69d5
SH256 hash:
57fe95c40d83f395bad243134a47ac8af1a322c7d246979562e2574036da5661
MD5 hash:
64f1d67b14dafea71c599e9c5498edc2
SHA1 hash:
6099ea6ef4fe0066c9d97822402878966026dae1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_Amadey
Author:ditekSHen
Description:Amadey downloader payload
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Amadey_7abb059b
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples
Rule name:win_amadey_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.amadey.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 57fe95c40d83f395bad243134a47ac8af1a322c7d246979562e2574036da5661

(this sample)

  
Delivery method
Distributed via web download

Comments