MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 85ac0e8244160430f8ca3d4fb031180ccf656a2d524a8fc2c828379c1c7b9e5f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 85ac0e8244160430f8ca3d4fb031180ccf656a2d524a8fc2c828379c1c7b9e5f
SHA3-384 hash: d11d705b02c73196ef8c0a149f314bbf1bf6b577a5627af8f15e415daa0fcb80ffc0f665a09b4eb77e42449fbd571ac5
SHA1 hash: 2008d7c4f9fe4d6e9ad9a328e636ae0b5222fde6
MD5 hash: 9c75e5c9f56150d3648691950f544f6b
humanhash: seventeen-stream-red-victor
File name:85ac0e8244160430f8ca3d4fb031180ccf656a2d524a8fc2c828379c1c7b9e5f
Download: download sample
Signature Amadey
File size:7'626'752 bytes
First seen:2021-08-19 13:27:22 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 196608:yqumukxXreZ5WXIP14ifwiTlQb3yVgsOyxI8:WCle2X2dIiTl83ympKI
Threatray 6 similar samples on MalwareBazaar
TLSH T164763311BA82C533E1AA0179057A8BB59F3E7D318B34C0CB67D4796E9D303D2AE36356
Reporter JAMESWT_WT
Tags:Amadey DMR Consulting Ltd. msi signed

Code Signing Certificate

Organisation:DMR Consulting Ltd.
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2021-07-24T00:00:00Z
Valid to:2022-07-22T23:59:59Z
Serial number: 01106cc293772ca905a2b6eff02bf0f5
Intelligence: 4 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: cabbc7016d74f2f284520f91eeccd159a71f3edb0aecc34a09acad2042bf9c26
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
316
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
57 / 100
Signature
Contains functionality to inject code into remote processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Yara detected Amadey bot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 468252 Sample: 3aQEy5mje2 Startdate: 19/08/2021 Architecture: WINDOWS Score: 57 56 Multi AV Scanner detection for dropped file 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 Yara detected Amadey bot 2->60 62 PE file has a writeable .text section 2->62 8 msiexec.exe 5 2->8         started        10 cmsengine.exe 2->10         started        12 cmsengine.exe 2->12         started        14 msiexec.exe 3 2->14         started        process3 process4 16 1setup.exe 4 8->16         started        19 expand.exe 8 8->19         started        21 icacls.exe 1 8->21         started        23 icacls.exe 1 8->23         started        file5 38 C:\Users\user\AppData\Local\...\lua5.1.dll, PE32 16->38 dropped 40 C:\Users\user\AppData\Local\...\irsetup.exe, PE32 16->40 dropped 25 irsetup.exe 9 334 16->25         started        42 C:\...\db5867bf0fd3ff499075de08ea5966f3.tmp, PE32 19->42 dropped 44 C:\Users\user\AppData\...\1setup.exe (copy), PE32 19->44 dropped 28 conhost.exe 19->28         started        30 conhost.exe 21->30         started        32 conhost.exe 23->32         started        process6 file7 46 C:\Users\user\AppData\...\cmsengine.exe, PE32 25->46 dropped 48 C:\Users\user\AppData\Roaming\...\virtclr.dll, PE32 25->48 dropped 50 C:\Users\user\AppData\...\virt_http.dll, PE32 25->50 dropped 52 19 other files (none is malicious) 25->52 dropped 34 cmsengine.exe 1 16 25->34         started        process8 dnsIp9 54 185.215.113.55, 80 WHOLESALECONNECTIONSNL Portugal 34->54 64 Machine Learning detection for dropped file 34->64 66 Contains functionality to inject code into remote processes 34->66 signatures10
Threat name:
Win32.Infostealer.Convagent
Status:
Malicious
First seen:
2021-08-05 00:29:05 UTC
File Type:
Binary (Archive)
Extracted files:
50
AV detection:
8 of 46 (17.39%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery upx
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Checks installed software on the system
Enumerates connected drives
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Microsoft Software Installer (MSI) msi 85ac0e8244160430f8ca3d4fb031180ccf656a2d524a8fc2c828379c1c7b9e5f

(this sample)

  
Delivery method
Distributed via web download

Comments