MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5f0a841a24fe65880413ade13e1f90e07330640f5d0e8e06509a22201c4cb1b1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 15


Intelligence 15 IOCs YARA 17 File information Comments 1

SHA256 hash: 5f0a841a24fe65880413ade13e1f90e07330640f5d0e8e06509a22201c4cb1b1
SHA3-384 hash: 17acf6914f7a804c6b8bd4d080b6ee35cdd37be4fa84490c919ea2dd01f480a2e9485a3ccd58e933a9c857c50b044039
SHA1 hash: 430ce67550b5e47fa486b16b54ff1f87ff87be28
MD5 hash: 5d26beb8eae1bcf1ba1fc82359f06df2
humanhash: yankee-artist-whiskey-neptune
File name:5d26beb8eae1bcf1ba1fc82359f06df2
Download: download sample
Signature CoinMiner
File size:806'712 bytes
First seen:2023-11-03 23:20:11 UTC
Last seen:2023-11-04 01:15:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1c05bda56b45141cb2325783d2af620e (1 x CoinMiner)
ssdeep 12288:kPoLpN82bScWfTvDb1XY7L7ezvBq0mBb3EKR234sLw5P6fyxEEi9NgyUI0L:dN82Mi34HsbHL5P6BEi9MI0L
TLSH T17D05D0552603803DECC65DBADA70F3829B6A55F11D91B3DB7280BE14E6EF3912B3311A
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 CoinMiner exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
333
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
http://185.196.9.171/ams.exe
Verdict:
Malicious activity
Analysis date:
2023-11-04 00:49:50 UTC
Tags:
loader amadey botnet stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed redline stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Xmrig, zgRAT
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Instant Messenger accounts or passwords
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected PersistenceViaHiddenTask
Yara detected UAC Bypass using CMSTP
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1336943 Sample: wqb7dL448k.exe Startdate: 04/11/2023 Architecture: WINDOWS Score: 100 104 time.windows.com 2->104 126 Snort IDS alert for network traffic 2->126 128 Found malware configuration 2->128 130 Malicious sample detected (through community Yara rule) 2->130 132 17 other signatures 2->132 12 cmd.exe 1 2->12         started        14 TypeId.exe 2->14         started        17 wqb7dL448k.exe 6 2->17         started        20 11 other processes 2->20 signatures3 process4 file5 22 kmzlorwm.exe 3 12->22         started        26 conhost.exe 12->26         started        178 Antivirus detection for dropped file 14->178 180 Machine Learning detection for dropped file 14->180 182 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->182 188 2 other signatures 14->188 28 TypeId.exe 14->28         started        86 C:\Windows\Temp\kmzlorwm.exe, PE32 17->86 dropped 88 C:\Windows\Temp\aiz3ewn1.inf, Windows 17->88 dropped 30 cmstp.exe 9 7 17->30         started        32 conhost.exe 17->32         started        184 Query firmware table information (likely to detect VMs) 20->184 186 Changes security center settings (notifications, updates, antivirus, firewall) 20->186 34 MpCmdRun.exe 20->34         started        36 conhost.exe 20->36         started        signatures6 process7 file8 90 C:\Users\user\AppData\Local\...\Utsysc.exe, PE32 22->90 dropped 134 Multi AV Scanner detection for dropped file 22->134 136 Machine Learning detection for dropped file 22->136 138 Contains functionality to inject code into remote processes 22->138 38 Utsysc.exe 25 22->38         started        140 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 28->140 142 Writes to foreign memory regions 28->142 144 Modifies the context of a thread in another process (thread injection) 28->144 146 2 other signatures 28->146 43 RegSvcs.exe 28->43         started        45 conhost.exe 34->45         started        signatures9 process10 dnsIp11 106 185.196.8.176, 49708, 49709, 80 SIMPLECARRER2IT Switzerland 38->106 108 77.91.70.80, 49710, 80 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 38->108 92 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 38->92 dropped 94 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 38->94 dropped 96 C:\Users\user\AppData\...\LaunchPatch.exe, PE32+ 38->96 dropped 98 5 other malicious files 38->98 dropped 148 Multi AV Scanner detection for dropped file 38->148 150 Creates an undocumented autostart registry key 38->150 152 Machine Learning detection for dropped file 38->152 154 Uses schtasks.exe or at.exe to add and modify task schedules 38->154 47 Lncijzzbob.exe 38->47         started        51 LaunchPatch.exe 38->51         started        53 rundll32.exe 38->53         started        55 3 other processes 38->55 156 Modifies the context of a thread in another process (thread injection) 43->156 158 Sample uses process hollowing technique 43->158 160 Injects a PE file into a foreign processes 43->160 file12 signatures13 process14 dnsIp15 110 91.193.43.180 ITFPL Belgium 47->110 112 Antivirus detection for dropped file 47->112 114 Machine Learning detection for dropped file 47->114 116 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 47->116 118 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 47->118 57 Lncijzzbob.exe 47->57         started        120 Modifies the context of a thread in another process (thread injection) 51->120 122 Injects a PE file into a foreign processes 51->122 60 LaunchPatch.exe 51->60         started        63 rundll32.exe 53->63         started        124 System process connects to network (likely due to code injection or exploit) 55->124 65 conhost.exe 55->65         started        67 conhost.exe 55->67         started        69 cmd.exe 1 55->69         started        71 5 other processes 55->71 signatures16 process17 file18 100 C:\Users\user\AppData\Local\...\Utsysc.exe, PE32 57->100 dropped 73 Utsysc.exe 57->73         started        102 C:\Users\user\AppData\Roaming\...\TypeId.exe, PE32+ 60->102 dropped 168 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 60->168 170 Tries to steal Instant Messenger accounts or passwords 63->170 172 Uses netsh to modify the Windows network and firewall settings 63->172 174 Tries to harvest and steal ftp login credentials 63->174 176 2 other signatures 63->176 76 netsh.exe 63->76         started        78 tar.exe 63->78         started        signatures19 process20 signatures21 162 Antivirus detection for dropped file 73->162 164 Machine Learning detection for dropped file 73->164 166 Injects a PE file into a foreign processes 73->166 80 Utsysc.exe 73->80         started        82 conhost.exe 76->82         started        84 conhost.exe 78->84         started        process22
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-10-31 01:47:02 UTC
File Type:
PE (Exe)
AV detection:
28 of 38 (73.68%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  5/10
Tags:
brand:microsoft phishing
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Detected potential entity reuse from brand microsoft.
Unpacked files
SH256 hash:
9da10d7b75c589f06f1758ed8e3c0335b9a738d0ad1317c48e380bca768bdddf
MD5 hash:
b6d627dcf04d04889b1f01a14ec12405
SHA1 hash:
f7292c3d6f2003947cc5455b41df5f8fbd14df14
Detections:
Amadey
SH256 hash:
853749374241aa7efd16e239c63ab68a25b4461b05739542d6d5d4aa22ad40a7
MD5 hash:
376008a3f76aba061bff72d304a567e8
SHA1 hash:
db97bd28be61ca9ab90b6a82dd8970ea04d69656
SH256 hash:
5f0a841a24fe65880413ade13e1f90e07330640f5d0e8e06509a22201c4cb1b1
MD5 hash:
5d26beb8eae1bcf1ba1fc82359f06df2
SHA1 hash:
430ce67550b5e47fa486b16b54ff1f87ff87be28
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly
Description:Amadey Payload
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_Amadey
Author:ditekSHen
Description:Amadey downloader payload
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Amadey_7abb059b
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples
Rule name:win_amadey_bytecodes_oct_2023
Author:Matthew @ Embee_Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 5f0a841a24fe65880413ade13e1f90e07330640f5d0e8e06509a22201c4cb1b1

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-11-03 23:20:12 UTC

url : hxxp://185.196.9.171/ams.exe