MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 68e4ec5353ebf39650fef8827957802e36a0f2617838bf57d3eebc9bb9a8df61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 16


Intelligence 16 IOCs YARA 58 File information Comments

SHA256 hash: 68e4ec5353ebf39650fef8827957802e36a0f2617838bf57d3eebc9bb9a8df61
SHA3-384 hash: 5cdda7e696e8c991856d8b87534ff257befba4cdde484d22175a841787eb7d8be6878e24195484a95b750bf90f107e1a
SHA1 hash: 24b887e898fb495bc0b8fb3ec6cae0715316dcd4
MD5 hash: 4d8b92c5ba2a991d5b71d9b47ee42789
humanhash: video-glucose-pasta-quebec
File name:4d8b92c5ba2a991d5b71d9b47ee42789.exe
Download: download sample
Signature Amadey
File size:811'008 bytes
First seen:2024-02-02 00:50:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7515ecf8c0dfa4d230ad835fe0acb57f (18 x Amadey, 4 x RedLineStealer, 2 x RiseProStealer)
ssdeep 12288:gFP2SlusFFenRo7YNQu4WioPJicryGBWECTFXB5XHrvBOXNpbyk8MtU1h/KH:A2UL2nqwQf6icoECJPXLvM8MYh6
Threatray 177 similar samples on MalwareBazaar
TLSH T1950533F741729522E17A72B0388609F86A70B85E76C8EF39731F05A529642AF9713F43
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
45.15.156.209:40481

Intelligence


File Origin
# of uploads :
1
# of downloads :
472
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
68e4ec5353ebf39650fef8827957802e36a0f2617838bf57d3eebc9bb9a8df61.exe
Verdict:
Malicious activity
Analysis date:
2024-02-02 00:50:40 UTC
Tags:
amadey botnet stealer loader redline miner stealc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
enigma lolbin obfuscated packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
LummaC, Amadey, PureLog Stealer, RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Stealc
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1385295 Sample: aAFT2MDHxI.exe Startdate: 02/02/2024 Architecture: WINDOWS Score: 100 101 secretionsuitcasenioise.shop 2->101 103 modestessayevenmilwek.shop 2->103 105 5 other IPs or domains 2->105 127 Snort IDS alert for network traffic 2->127 129 Multi AV Scanner detection for domain / URL 2->129 131 Found malware configuration 2->131 133 22 other signatures 2->133 10 aAFT2MDHxI.exe 1 5 2->10         started        14 uwgxswmtctao.exe 2->14         started        16 svchost.exe 2->16         started        18 6 other processes 2->18 signatures3 process4 file5 81 C:\Users\user\AppData\Local\...\explorhe.exe, PE32 10->81 dropped 165 Detected unpacking (changes PE section rights) 10->165 167 Contains functionality to detect sleep reduction / modifications 10->167 20 explorhe.exe 56 10->20         started        83 C:\Windows\Temp\rljxappkaarw.sys, PE32+ 14->83 dropped 169 Multi AV Scanner detection for dropped file 14->169 171 Injects code into the Windows Explorer (explorer.exe) 14->171 173 Modifies the context of a thread in another process (thread injection) 14->173 175 Sample is not signed and drops a device driver 14->175 25 explorer.exe 14->25         started        177 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->177 27 WerFault.exe 16->27         started        29 conhost.exe 18->29         started        31 conhost.exe 18->31         started        33 Conhost.exe 18->33         started        signatures6 process7 dnsIp8 107 185.215.113.68, 49704, 49705, 49707 WHOLESALECONNECTIONSNL Portugal 20->107 109 109.107.182.3, 49706, 49709, 49711 TELEPORT-TV-ASRU Russian Federation 20->109 111 185.172.128.19 NADYMSS-ASRU Russian Federation 20->111 73 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 20->73 dropped 75 C:\Users\user\AppData\Local\...\dayroc.exe, PE32 20->75 dropped 77 C:\Users\user\AppData\Local\Temp\...\RDX.exe, PE32 20->77 dropped 79 25 other malicious files 20->79 dropped 153 Multi AV Scanner detection for dropped file 20->153 155 Detected unpacking (changes PE section rights) 20->155 157 Creates an undocumented autostart registry key 20->157 163 5 other signatures 20->163 35 crptchk.exe 2 20->35         started        38 crypted.exe 20->38         started        40 mrk1234.exe 20->40         started        42 12 other processes 20->42 113 pool.hashvault.pro 142.202.242.45, 49718, 80 1GSERVERSUS Reserved 25->113 159 System process connects to network (likely due to code injection or exploit) 25->159 161 Query firmware table information (likely to detect VMs) 25->161 file9 signatures10 process11 dnsIp12 135 Multi AV Scanner detection for dropped file 35->135 137 Found many strings related to Crypto-Wallets (likely being stolen) 35->137 139 Writes to foreign memory regions 35->139 46 RegAsm.exe 4 35->46         started        50 conhost.exe 35->50         started        141 Allocates memory in foreign processes 38->141 143 Injects a PE file into a foreign processes 38->143 52 RegAsm.exe 38->52         started        55 RegAsm.exe 40->55         started        121 80.79.4.61, 18236, 49717 SISTEMEMD Moldova Republic of 42->121 123 195.20.16.103, 20440, 49716 EITADAT-ASFI Finland 42->123 125 7 other IPs or domains 42->125 85 C:\Users\user\AppData\Local\...\toolspub1.exe, PE32 42->85 dropped 87 C:\...\d21cbe21e38b385a41a68c5e6dd32f4c.exe, PE32 42->87 dropped 89 C:\Users\user\AppData\...\InstallSetup9.exe, PE32 42->89 dropped 91 C:\ProgramData\...\uwgxswmtctao.exe, PE32+ 42->91 dropped 145 System process connects to network (likely due to code injection or exploit) 42->145 147 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->147 149 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 42->149 151 4 other signatures 42->151 57 RegAsm.exe 42->57         started        59 RegAsm.exe 42->59         started        61 sc.exe 42->61         started        63 7 other processes 42->63 file13 signatures14 process15 dnsIp16 93 C:\Users\user\AppData\Local\...\chrosha.exe, PE32 46->93 dropped 179 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 46->179 181 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 46->181 115 144.76.1.85 HETZNER-ASDE Germany 52->115 95 C:\Users\user\AppData\Local\...\qemu-ga.exe, PE32 52->95 dropped 183 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 52->183 117 mealroomrallpassiveer.shop 104.21.47.178, 443, 49738 CLOUDFLARENETUS United States 55->117 185 LummaC encrypted strings found 55->185 97 C:\Users\user\AppData\Roaming\...\olehps.exe, PE32 57->97 dropped 99 C:\Users\user\AppData\Roaming\...\Logs.exe, PE32 57->99 dropped 119 20.79.30.95, 33223, 49744 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 59->119 65 conhost.exe 61->65         started        67 conhost.exe 63->67         started        69 conhost.exe 63->69         started        71 conhost.exe 63->71         started        file17 signatures18 process19
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2024-02-02 00:51:05 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:redline family:risepro family:xmrig family:zgrat botnet:2024 botnet:@oni912 botnet:@pixelscloud botnet:livetrafic evasion infostealer miner persistence rat stealer trojan upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Launches sc.exe
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
.NET Reactor proctector
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Identifies Wine through registry keys
UPX packed file
Creates new service(s)
Downloads MZ/PE file
Modifies Windows Firewall
Stops running service(s)
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner payload
Amadey
Detect ZGRat V1
RedLine
RedLine payload
RisePro
ZGRat
xmrig
Malware Config
C2 Extraction:
http://185.215.113.68
195.20.16.103:20440
20.79.30.95:33223
94.156.67.230:13781
45.15.156.209:40481
193.233.132.62:50500
http://193.233.132.167
Unpacked files
SH256 hash:
68e4ec5353ebf39650fef8827957802e36a0f2617838bf57d3eebc9bb9a8df61
MD5 hash:
4d8b92c5ba2a991d5b71d9b47ee42789
SHA1 hash:
24b887e898fb495bc0b8fb3ec6cae0715316dcd4
Detections:
SUSP_XORed_URL_In_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly
Description:Amadey Payload
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Borland
Author:malware-lu
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:crime_ZZ_botnet_aicm
Author:imp0rtp3
Description:DDoS Golang Botnet sample for linux called 'aicm'
Reference:https://twitter.com/IntezerLabs/status/1401869234511175683
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:EnigmaProtector1XSukhovVladimirSergeNMarkin
Author:malware-lu
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:Glupteba
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_DisableWinDefender
Author:ditekSHen
Description:Detects executables containing artifacts associated with disabling Widnows Defender
Rule name:INDICATOR_SUSPICIOUS_EXE_DiscordURL
Author:ditekSHen
Description:Detects executables Discord URL observed in first stage droppers
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL
Author:ditekSHen
Description:Detects executables containing URLs to raw contents of a Github gist
Rule name:INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA
Author:ditekSHen
Description:Detects executables referencing many varying, potentially fake Windows User-Agents
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MacOS_Cryptominer_Generic_333129b7
Author:Elastic Security
Rule name:MacOS_Cryptominer_Xmrig_241780a1
Author:Elastic Security
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_CoinMiner02
Author:ditekSHen
Description:Detects coinmining malware
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Mimikatz_Generic
Author:Still
Description:attempts to match all variants of Mimikatz
Rule name:NET
Author:malware-lu
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:rig_win64_xmrig_6_13_1_xmrig
Author:yarGen Rule Generator
Description:rig_win64 - file xmrig.exe
Reference:https://github.com/Neo23x0/yarGen
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_Websites
Author:SECUINFRA Falcon Team
Description:Detects the reference of suspicious sites that might be used to download further malware
Rule name:SUSP_XORed_URL_In_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UroburosVirtualBoxDriver
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples
Rule name:win_amadey_bytecodes_oct_2023
Author:Matthew @ Embee_Research
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 68e4ec5353ebf39650fef8827957802e36a0f2617838bf57d3eebc9bb9a8df61

(this sample)

  
Delivery method
Distributed via web download

Comments