MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 642e4420c4f480ce367d90715dccd8e1cd869fec70dc619f3628b2085053b6d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 642e4420c4f480ce367d90715dccd8e1cd869fec70dc619f3628b2085053b6d9
SHA3-384 hash: fc14b17c884cde798c86ee66d4f6540ced938cf3b444884624ad7d7afcb5396efeaec100c89963dfd0b07a6279cc70b9
SHA1 hash: 8328bdbd9df20c1d9e8e088ed464c5ae6b6840cf
MD5 hash: aceb106ad014ae417fe774ebd38b4d65
humanhash: friend-alanine-jig-six
File name:random.exe
Download: download sample
Signature Amadey
File size:3'016'704 bytes
First seen:2025-06-03 09:57:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:hGrSPKwnEO/RgBc2UPHDaxk2Du/6zXFM77ABY:YQKwnE+iBc2UPjaxtpz1Qw
Threatray 5 similar samples on MalwareBazaar
TLSH T16DD53AE2A60572CBD4CA27B48827CD8A9EAD07B647208CC7D86C757E7D73CC615B6C24
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:Amadey exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
479
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-06-03 10:16:28 UTC
Tags:
amadey botnet stealer rdp themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
vmdetect autorun delphi spoof
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Creating a file
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Connection attempt to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypt microsoft_visual_cc packed packed packer_detected
Result
Threat name:
Amadey, AsyncRAT, Discord Token Stealer, , LummaC Stealer, Quasar
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Connects to a pastebin service (likely for C&C)
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Uses threadpools to delay analysis
Writes a notice file (html or txt) to demand a ransom
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Costura Assembly Loader
Yara detected Discord Token Stealer
Yara detected LummaC Stealer
Yara detected Powershell decode and execute
Yara detected Quasar RAT
Yara detected SugarDump
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1704782 Sample: random.exe Startdate: 03/06/2025 Architecture: WINDOWS Score: 100 155 pastebin.com 2->155 157 downloadtech.duckdns.org 2->157 159 26 other IPs or domains 2->159 199 Suricata IDS alerts for network traffic 2->199 201 Found malware configuration 2->201 203 Malicious sample detected (through community Yara rule) 2->203 209 25 other signatures 2->209 11 ramez.exe 57 2->11         started        16 random.exe 5 2->16         started        18 Runtime Broker.exe 2->18         started        signatures3 205 Connects to a pastebin service (likely for C&C) 155->205 207 Uses dynamic DNS services 157->207 process4 dnsIp5 171 185.156.72.96 ITDELUXE-ASRU Russian Federation 11->171 173 185.156.72.2 ITDELUXE-ASRU Russian Federation 11->173 175 77.83.207.69 DINET-ASRU Russian Federation 11->175 129 C:\Users\user\AppData\Local\...VXhGDB.exe, PE32 11->129 dropped 131 C:\Users\user\AppData\Local\...\7NrFcbr.exe, PE32 11->131 dropped 133 C:\Users\user\AppData\Local\...\7Mnq9mr.exe, PE32 11->133 dropped 139 23 other malicious files 11->139 dropped 241 Contains functionality to start a terminal service 11->241 243 Hides threads from debuggers 11->243 245 Tries to detect sandboxes / dynamic malware analysis system (registry check) 11->245 247 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 11->247 20 8f2lGlV.exe 11->20         started        23 fipu26A.exe 11->23         started        27 6whDrpz.exe 1 11->27         started        31 5 other processes 11->31 135 C:\Users\user\AppData\Local\...\ramez.exe, PE32 16->135 dropped 137 C:\Users\user\...\ramez.exe:Zone.Identifier, ASCII 16->137 dropped 249 Detected unpacking (changes PE section rights) 16->249 251 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 16->251 253 Tries to evade debugger and weak emulator (self modifying code) 16->253 255 Tries to detect virtualization through RDTSC time measurements 16->255 29 ramez.exe 16->29         started        file6 signatures7 process8 dnsIp9 211 Multi AV Scanner detection for dropped file 20->211 227 3 other signatures 20->227 33 8f2lGlV.exe 20->33         started        161 pastebin.com 172.67.25.94 CLOUDFLARENETUS United States 23->161 163 ip-api.com 208.95.112.1 TUT-ASUS United States 23->163 167 3 other IPs or domains 23->167 119 C:\Users\user\AppData\Local\Temp\Zip.exe, PE32 23->119 dropped 121 C:\Users\user\AppData\...121ewtonsoft.Json.dll, PE32 23->121 dropped 123 C:\Users\user\...\recovery_summary.txt, Unicode 23->123 dropped 213 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 23->213 215 Found many strings related to Crypto-Wallets (likely being stolen) 23->215 217 Found strings related to Crypto-Mining 23->217 229 4 other signatures 23->229 37 powershell.exe 23->37         started        231 3 other signatures 27->231 39 MSBuild.exe 27->39         started        41 conhost.exe 27->41         started        219 Contains functionality to start a terminal service 29->219 221 Tries to detect sandboxes and other dynamic analysis tools (window names) 29->221 233 6 other signatures 29->233 165 interconstructionsite.pro 172.67.149.248 CLOUDFLARENETUS United States 31->165 125 C:\Users\user\AppData\...\Runtime Broker.exe, PE32 31->125 dropped 127 C:\Users\user\AppData\Local\Temp\Vs.xltx, DOS 31->127 dropped 223 Antivirus detection for dropped file 31->223 225 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 31->225 235 4 other signatures 31->235 43 MSBuild.exe 31->43         started        45 Runtime Broker.exe 31->45         started        47 schtasks.exe 31->47         started        49 2 other processes 31->49 file10 signatures11 process12 dnsIp13 141 7.99.4t.com 88.198.239.242 HETZNER-ASDE Germany 33->141 177 Found many strings related to Crypto-Wallets (likely being stolen) 33->177 179 Encrypted powershell cmdline option found 33->179 181 Tries to harvest and steal browser information (history, passwords, etc) 33->181 51 powershell.exe 33->51         started        55 powershell.exe 33->55         started        57 powershell.exe 33->57         started        69 11 other processes 33->69 183 Compiles code for process injection (via .Net compiler) 37->183 185 Loading BitLocker PowerShell Module 37->185 59 conhost.exe 37->59         started        61 WmiPrvSE.exe 37->61         started        143 pavpwe.run 172.67.175.211 CLOUDFLARENETUS United States 39->143 187 Query firmware table information (likely to detect VMs) 39->187 189 Tries to harvest and steal ftp login credentials 39->189 191 Tries to steal Crypto Currency Wallets 39->191 193 Tries to steal from password manager 39->193 145 t.me 149.154.167.99 TELEGRAMRU United Kingdom 43->145 147 korxddl.top 195.82.147.188 DREAMTORRENT-CORP-ASRU Russian Federation 43->147 153 2 other IPs or domains 43->153 195 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 43->195 149 46.247.108.161 FLUIDATAGB United Kingdom 45->149 151 ipwho.is 108.181.98.179 ASN852CA Canada 45->151 197 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->197 63 schtasks.exe 45->63         started        65 conhost.exe 47->65         started        67 conhost.exe 49->67         started        signatures14 process15 file16 103 C:\Users\user\AppData\...\nuzib52e.cmdline, Unicode 51->103 dropped 237 Writes to foreign memory regions 51->237 239 Creates a thread in another existing process (thread injection) 51->239 71 csc.exe 51->71         started        74 conhost.exe 51->74         started        105 C:\Users\user\AppData\Local\...\aupi1grs.0.cs, Unicode 55->105 dropped 76 conhost.exe 55->76         started        78 csc.exe 57->78         started        80 conhost.exe 57->80         started        82 conhost.exe 63->82         started        84 csc.exe 69->84         started        86 csc.exe 69->86         started        88 7 other processes 69->88 signatures17 process18 dnsIp19 107 C:\Users\user\AppData\Local\...\nuzib52e.dll, PE32 71->107 dropped 91 cvtres.exe 71->91         started        109 C:\Users\user\AppData\Local\...\byzhmpdt.dll, PE32 78->109 dropped 93 cvtres.exe 78->93         started        111 C:\Users\user\AppData\Local\...\ywsco45s.dll, PE32 84->111 dropped 95 cvtres.exe 84->95         started        113 C:\Users\user\AppData\Local\...\wsa5qhpa.dll, PE32 86->113 dropped 97 cvtres.exe 86->97         started        169 www.google.com 142.250.115.104 GOOGLEUS United States 88->169 115 C:\Users\user\AppData\Local\...\ojd5rmyh.dll, PE32 88->115 dropped 117 C:\Users\user\AppData\Local\...\amtfrkxu.dll, PE32 88->117 dropped 99 cvtres.exe 88->99         started        101 cvtres.exe 88->101         started        file20 process21
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-06-03 08:13:44 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:donutloader family:modiloader family:quasar family:stealc botnet:8d33eb botnet:office04 botnet:test collection defense_evasion discovery execution loader miner persistence spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops desktop.ini file(s)
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Cryptocurrency Miner
Executes dropped EXE
Identifies Wine through registry keys
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Detected Nirsoft tools
Identifies VirtualBox via ACPI registry values (likely anti-VM)
ModiLoader Second Stage
NirSoft MailPassView
NirSoft WebBrowserPassView
Amadey
Amadey family
Detects DonutLoader
DonutLoader
Donutloader family
ModiLoader, DBatLoader
Modiloader family
Quasar RAT
Quasar family
Quasar payload
Stealc
Stealc family
Malware Config
C2 Extraction:
http://185.156.72.96
41.216.182.65
46.247.108.161:5135
Verdict:
Malicious
Tags:
external_ip_lookup
YARA:
n/a
Unpacked files
SH256 hash:
642e4420c4f480ce367d90715dccd8e1cd869fec70dc619f3628b2085053b6d9
MD5 hash:
aceb106ad014ae417fe774ebd38b4d65
SHA1 hash:
8328bdbd9df20c1d9e8e088ed464c5ae6b6840cf
SH256 hash:
a68df94820b72763fe820d3ab1b212493c0767f651f91f27b3b3403885d69ec0
MD5 hash:
215b1b0533eec3397b34ae66daba5ca7
SHA1 hash:
c03eb5305d40c734d7408fdaa8566aa3f1392efb
Detections:
Amadey
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 642e4420c4f480ce367d90715dccd8e1cd869fec70dc619f3628b2085053b6d9

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments