MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8910c865cc2f368e2272f48b55656bf12ca421d7c6d25aabf51a0c09925f4232. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 17


Intelligence 17 IOCs YARA 1 File information Comments

SHA256 hash: 8910c865cc2f368e2272f48b55656bf12ca421d7c6d25aabf51a0c09925f4232
SHA3-384 hash: bd6f4d6a1ace0f8577e91871eb5a0585f8466f06550b8878532410048e908537f825c5752593d530a560f324e6b7a720
SHA1 hash: c144bc1c5a94db0088f789cb9c1188a5d350c547
MD5 hash: c1654db77e2a8bfe93751d3a6106abf7
humanhash: kansas-maryland-nine-grey
File name:c1654db77e2a8bfe93751d3a6106abf7.exe
Download: download sample
Signature Amadey
File size:1'523'712 bytes
First seen:2023-10-24 12:40:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:WyNdtYdpskyNrbbWCE1r5nRGbWPzAECiFMkxe6cDBcuIk7t6t/+3tr+OINldi0SR:lmpsxbbIbtPzjCwh4LcTqtDtr+J80dK
Threatray 2'029 similar samples on MalwareBazaar
TLSH T1C2652345BBD48173E96417B85CF706C36632BDE58AB0C27F2B82E45B1873AE060357A7
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
77.91.124.86:19084

Intelligence


File Origin
# of uploads :
1
# of downloads :
348
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
c1654db77e2a8bfe93751d3a6106abf7.exe
Verdict:
Malicious activity
Analysis date:
2023-10-24 16:16:21 UTC
Tags:
stealer redline amadey botnet trojan sinkhole opendir loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Сreating synchronization primitives
Sending a custom TCP request
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Forced shutdown of a system process
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Unauthorized injection to a system process
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
89%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, RedLin
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1331250 Sample: L6bCwpWOmB.exe Startdate: 24/10/2023 Architecture: WINDOWS Score: 100 80 Snort IDS alert for network traffic 2->80 82 Found malware configuration 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 15 other signatures 2->86 11 L6bCwpWOmB.exe 1 4 2->11         started        14 rundll32.exe 2->14         started        16 rundll32.exe 2->16         started        18 rundll32.exe 2->18         started        process3 file4 64 C:\Users\user\AppData\Local\...\lH2Bu8Lb.exe, PE32 11->64 dropped 66 C:\Users\user\AppData\Local\...\6tg94XH.exe, PE32 11->66 dropped 20 lH2Bu8Lb.exe 1 4 11->20         started        process5 file6 56 C:\Users\user\AppData\Local\...\RW6FG3pW.exe, PE32 20->56 dropped 58 C:\Users\user\AppData\Local\...\5Uj42OM.exe, PE32 20->58 dropped 96 Antivirus detection for dropped file 20->96 98 Machine Learning detection for dropped file 20->98 24 RW6FG3pW.exe 1 4 20->24         started        signatures7 process8 file9 60 C:\Users\user\AppData\Local\...d1XV0nC.exe, PE32 24->60 dropped 62 C:\Users\user\AppData\Local\...\4HL148Vw.exe, PE32 24->62 dropped 100 Antivirus detection for dropped file 24->100 102 Machine Learning detection for dropped file 24->102 28 Ed1XV0nC.exe 1 4 24->28         started        32 4HL148Vw.exe 24->32         started        signatures10 process11 file12 68 C:\Users\user\AppData\Local\...\cn9Ch6XP.exe, PE32 28->68 dropped 70 C:\Users\user\AppData\Local\...\3ZX1kJ52.exe, PE32 28->70 dropped 120 Antivirus detection for dropped file 28->120 122 Machine Learning detection for dropped file 28->122 34 cn9Ch6XP.exe 1 4 28->34         started        38 3ZX1kJ52.exe 12 28->38         started        124 Writes to foreign memory regions 32->124 126 Allocates memory in foreign processes 32->126 128 Injects a PE file into a foreign processes 32->128 40 AppLaunch.exe 32->40         started        signatures13 process14 file15 52 C:\Users\user\AppData\Local\...\2Zz185bw.exe, PE32 34->52 dropped 54 C:\Users\user\AppData\Local\...\1fp55Mx9.exe, PE32 34->54 dropped 88 Antivirus detection for dropped file 34->88 90 Machine Learning detection for dropped file 34->90 42 1fp55Mx9.exe 34->42         started        45 2Zz185bw.exe 4 34->45         started        92 Multi AV Scanner detection for dropped file 38->92 94 Tries to harvest and steal browser information (history, passwords, etc) 40->94 signatures16 process17 dnsIp18 104 Contains functionality to inject code into remote processes 42->104 106 Writes to foreign memory regions 42->106 108 Allocates memory in foreign processes 42->108 110 Injects a PE file into a foreign processes 42->110 48 AppLaunch.exe 12 42->48         started        74 77.91.124.86, 19084, 49713, 49719 ECOTEL-ASRU Russian Federation 45->74 112 Antivirus detection for dropped file 45->112 114 Multi AV Scanner detection for dropped file 45->114 116 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 45->116 118 2 other signatures 45->118 signatures19 process20 dnsIp21 72 193.233.255.73, 49712, 49717, 80 FREE-NET-ASFREEnetEU Russian Federation 48->72 76 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 48->76 78 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 48->78 signatures22
Threat name:
Win32.Trojan.Stealerc
Status:
Malicious
First seen:
2023-10-24 12:34:55 UTC
File Type:
PE (Exe)
Extracted files:
193
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:kinza infostealer persistence
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
RedLine
RedLine payload
Malware Config
C2 Extraction:
77.91.124.86:19084
Unpacked files
SH256 hash:
898e2bb3b502b5410df359ca4ebb131921b20fcc61e171140dce3e82a2e9c0b9
MD5 hash:
dfd83a42dff6c438fa0b3e7ab9ba01c1
SHA1 hash:
4300fe101e3b3caddb086370553a50f69a2e0061
SH256 hash:
b7fd7661c3abf4ae50b4d67d8cb7aca69adf222e8feb783150e343f13c54d11d
MD5 hash:
b475de97b76f94f7d033e4df40ee9ba1
SHA1 hash:
06ae5b92dd043ca661a1cca02d14f506093449cb
SH256 hash:
9cfaaac5c576bde04fb441fa6a229faf0313ce10b18c526105d9df4f8a862e23
MD5 hash:
e3d22298a04edca94e736ff7ff535da1
SHA1 hash:
43c2a026d142f9459bc86a0c383c804321622e4c
Detections:
Amadey win_amadey_auto
SH256 hash:
9caabd27add9b28c5ac3eec85227147a09a6e681574d6ac44ed4c3fdb848e185
MD5 hash:
184c4d587455ee6a67a667c405a1c261
SHA1 hash:
8d3f211992680759dd3032a0c0c81261a2025637
SH256 hash:
8910c865cc2f368e2272f48b55656bf12ca421d7c6d25aabf51a0c09925f4232
MD5 hash:
c1654db77e2a8bfe93751d3a6106abf7
SHA1 hash:
c144bc1c5a94db0088f789cb9c1188a5d350c547
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 8910c865cc2f368e2272f48b55656bf12ca421d7c6d25aabf51a0c09925f4232

(this sample)

  
Delivery method
Distributed via web download

Comments