MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5fce87d7f9cf4e75b8a64b251a1aa2c7d60edda88efc346d8ddfefc56f58b5ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 5fce87d7f9cf4e75b8a64b251a1aa2c7d60edda88efc346d8ddfefc56f58b5ed
SHA3-384 hash: 67eaebf7e4a2d9dfb0fa7b61979618b06ce21b7ff1915e2ee6a97d45953fb168bb760d4ff207a8018aba6d03d3042aae
SHA1 hash: 20a07697562bd20d4071560895e14475d533a2e3
MD5 hash: 5aaa9d6ec23bb2fba71c9582fa960617
humanhash: social-beryllium-massachusetts-blossom
File name:5aaa9d6ec23bb2fba71c9582fa960617.exe
Download: download sample
Signature Amadey
File size:254'976 bytes
First seen:2023-03-07 07:20:17 UTC
Last seen:2023-03-07 08:36:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 53ba325a46548c46e5a260a91003d321 (2 x Amadey)
ssdeep 6144:mz0iMriTgp6CZayUG8DbNcLYwUuFylfA9RGOjp:1TNHUG8txwUuFyl49Rt
Threatray 1 similar samples on MalwareBazaar
TLSH T10144E7607D22C031C560617729B9BFF2C19D78259BB049DB7B800F7ADA122E67A70E7D
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://specialblue.in/dF30Hn4m/index.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
7570f1660581e11b6c07f05bd73914bd.exe
Verdict:
Malicious activity
Analysis date:
2023-02-19 17:05:22 UTC
Tags:
trojan amadey loader gcleaner stealer rat redline opendir cryptbot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Creating a window
Creating a file
DNS request
Sending an HTTP POST request
Delayed reading of the file
Sending a custom TCP request
Adding an access-denied ACE
Launching the default Windows debugger (dwwin.exe)
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
amadey barys greyware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 821264 Sample: KERJNKR0xh.exe Startdate: 07/03/2023 Architecture: WINDOWS Score: 100 73 Malicious sample detected (through community Yara rule) 2->73 75 Antivirus / Scanner detection for submitted sample 2->75 77 Multi AV Scanner detection for dropped file 2->77 79 4 other signatures 2->79 10 KERJNKR0xh.exe 3 2->10         started        14 mnolyk.exe 2->14         started        process3 file4 65 C:\Users\user\AppData\Local\...\mnolyk.exe, PE32 10->65 dropped 89 Contains functionality to inject code into remote processes 10->89 16 mnolyk.exe 21 10->16         started        signatures5 process6 dnsIp7 67 37.139.129.69 LVLT-10753US Germany 16->67 69 8.8.8.8 GOOGLEUS United States 16->69 57 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 16->57 dropped 59 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 16->59 dropped 61 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 16->61 dropped 63 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 16->63 dropped 81 Antivirus detection for dropped file 16->81 83 Multi AV Scanner detection for dropped file 16->83 85 Creates an undocumented autostart registry key 16->85 87 2 other signatures 16->87 21 rundll32.exe 16->21         started        23 rundll32.exe 16->23         started        25 rundll32.exe 16->25         started        27 5 other processes 16->27 file8 signatures9 process10 process11 29 rundll32.exe 21->29         started        32 rundll32.exe 25 23->32         started        35 rundll32.exe 23 25->35         started        37 conhost.exe 27->37         started        39 conhost.exe 27->39         started        41 cmd.exe 1 27->41         started        43 5 other processes 27->43 dnsIp12 91 System process connects to network (likely due to code injection or exploit) 29->91 93 Tries to steal Instant Messenger accounts or passwords 29->93 95 Tries to harvest and steal ftp login credentials 29->95 97 Tries to harvest and steal browser information (history, passwords, etc) 29->97 45 tar.exe 29->45         started        71 192.168.2.1 unknown unknown 32->71 47 tar.exe 32->47         started        49 tar.exe 35->49         started        signatures13 process14 process15 51 conhost.exe 45->51         started        53 conhost.exe 47->53         started        55 conhost.exe 49->55         started       
Threat name:
Win32.Trojan.Malgent
Status:
Malicious
First seen:
2023-02-19 11:54:44 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
26 of 39 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Amadey
Malware Config
C2 Extraction:
specialblue.in/dF30Hn4m/index.php
specialblue.pm/dF30Hn4m/index.php
specialblue.wf/dF30Hn4m/index.php
Unpacked files
SH256 hash:
5fce87d7f9cf4e75b8a64b251a1aa2c7d60edda88efc346d8ddfefc56f58b5ed
MD5 hash:
5aaa9d6ec23bb2fba71c9582fa960617
SHA1 hash:
20a07697562bd20d4071560895e14475d533a2e3
Detections:
Amadey
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 5fce87d7f9cf4e75b8a64b251a1aa2c7d60edda88efc346d8ddfefc56f58b5ed

(this sample)

  
Delivery method
Distributed via web download

Comments