MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8aecd82f1657ec863032e6b326d0c91a7599200a0ef9ba4bfe88a9da5256de8c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 14


Intelligence 14 IOCs YARA 13 File information Comments

SHA256 hash: 8aecd82f1657ec863032e6b326d0c91a7599200a0ef9ba4bfe88a9da5256de8c
SHA3-384 hash: a138f84a211cdd46815ce5cd423b4a326d3ff13af121379f3047d3d8f6879b3572eb89d2bc60c680b191ba231996c6e6
SHA1 hash: 4420b56b59d83516c4df8063d17b0c11a093e194
MD5 hash: 1a2d0fd61c88e6418f984f78884662e6
humanhash: robert-king-saturn-georgia
File name:setup.exe
Download: download sample
Signature Amadey
File size:22'384'640 bytes
First seen:2025-04-29 11:58:49 UTC
Last seen:2025-04-29 11:59:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c7557a1f30a2f0db3342f8134687436a (3 x LummaStealer, 1 x Amadey)
ssdeep 393216:986efDtzRkGWfiUlI/rZv5p1h7Jsv6tWKFdu9CfRc:FozRkGWNo571hbG
Threatray 8 similar samples on MalwareBazaar
TLSH T18A376C00A7D6C136FAE316B6497F861D4735B9520B3442CBB38C2A6E5E31AE17D36387
TrID 53.5% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
13.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.8% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
6.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.7% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon e9c8c8dc70646c69 (3 x LummaStealer, 1 x Amadey)
Reporter abuse_ch
Tags:Amadey de-pumped exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
507
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup.exe
Verdict:
Malicious activity
Analysis date:
2025-04-29 12:13:48 UTC
Tags:
lumma stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
vmdetect phishing delphi
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
DNS request
Behavior that indicates a threat
Connection attempt
Sending a custom TCP request
Query of malicious DNS domain
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
action entropy explorer fingerprint keylogger lolbin microsoft_visual_cc overlay packed packed packer_detected rat rat regedit remote tracker
Result
Threat name:
LummaC Stealer, Amadey, CryptOne
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected CryptOne packer
Yara detected LummaC Stealer
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1677256 Sample: setup.exe Startdate: 29/04/2025 Architecture: WINDOWS Score: 100 73 x.ss2.us 2->73 75 viridisw.top 2->75 77 12 other IPs or domains 2->77 105 Suricata IDS alerts for network traffic 2->105 107 Found malware configuration 2->107 109 Malicious sample detected (through community Yara rule) 2->109 111 12 other signatures 2->111 9 setup.exe 18 2->9         started        14 Safari.exe 2->14         started        signatures3 process4 dnsIp5 87 steamcommunity.com 23.52.218.12, 443, 49683 TelecentroSAAR United States 9->87 89 h1.startingshabby.world 104.21.88.117, 443, 49694 CLOUDFLARENETUS United States 9->89 91 viridisw.top 172.67.197.137, 443, 49687, 49688 CLOUDFLARENETUS United States 9->91 65 C:\...\WS6LW0P4LRD07KITOVQWY69YVBQAY.exe, PE32 9->65 dropped 67 C:\Users\user\AppData\Local\...\msvcr120.dll, PE32+ 9->67 dropped 69 C:\Users\user\AppData\Local\...\msvcp120.dll, PE32+ 9->69 dropped 71 12 other malicious files 9->71 dropped 127 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->127 129 Query firmware table information (likely to detect VMs) 9->129 131 Tries to harvest and steal ftp login credentials 9->131 135 3 other signatures 9->135 16 Clus-Blue.exe 16 9->16         started        20 WS6LW0P4LRD07KITOVQWY69YVBQAY.exe 3 9->20         started        23 8JJVDH3J8GJRSCKZN6SKHQ8P.exe 2 2 9->23         started        133 Multi AV Scanner detection for dropped file 14->133 file6 signatures7 process8 dnsIp9 47 C:\ProgramData\Fidl\Clus-Blue.exe, PE32+ 16->47 dropped 49 C:\ProgramData\Fidl\msvcr120.dll, PE32+ 16->49 dropped 51 C:\ProgramData\Fidl\msvcp120.dll, PE32+ 16->51 dropped 57 10 other files (none is malicious) 16->57 dropped 93 Tries to evade debugger and weak emulator (self modifying code) 16->93 95 Hides threads from debuggers 16->95 97 Found direct / indirect Syscall (likely to bypass EDR) 16->97 25 Clus-Blue.exe 8 16->25         started        79 a8a00b7a27dd309f6.awsglobalaccelerator.com 15.197.198.189, 49705, 8545 TANDEMUS United States 20->79 81 62.60.234.10, 1488, 49709, 49710 ASLINE-AS-APASLINELIMITEDHK Iran (ISLAMIC Republic Of) 20->81 83 2 other IPs or domains 20->83 53 C:\ProgramData\shark.exe, PE32 20->53 dropped 99 Multi AV Scanner detection for dropped file 20->99 101 Detected unpacking (changes PE section rights) 20->101 29 cmd.exe 1 20->29         started        31 WerFault.exe 2 20->31         started        33 WerFault.exe 2 20->33         started        35 9 other processes 20->35 55 C:\ProgramData\Safari\Safari.exe, PE32 23->55 dropped 103 Creates multiple autostart registry keys 23->103 file10 signatures11 process12 file13 59 C:\Users\user\AppData\Local\...\C4352EE.tmp, PE32 25->59 dropped 61 C:\Users\user\AppData\Local\Temp\...\ping.com, PE32 25->61 dropped 63 C:\ProgramData\Fidl\360Tray.exe, PE32 25->63 dropped 119 Tries to detect sandboxes and other dynamic analysis tools (window names) 25->119 121 Drops PE files with a suspicious file extension 25->121 123 Tries to evade debugger and weak emulator (self modifying code) 25->123 125 4 other signatures 25->125 37 ping.com 12 25->37         started        41 360Tray.exe 25->41         started        43 reg.exe 1 1 29->43         started        45 conhost.exe 29->45         started        signatures14 process15 dnsIp16 85 tackleoutplayed.com 172.67.139.250, 49702, 80 CLOUDFLARENETUS United States 37->85 113 Switches to a custom stack to bypass stack traces 37->113 115 Found direct / indirect Syscall (likely to bypass EDR) 37->115 117 Creates multiple autostart registry keys 43->117 signatures17
Gathering data
Threat name:
Win32.Spyware.Lummastealer
Status:
Suspicious
First seen:
2025-04-29 11:59:11 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
16 of 24 (66.67%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma discovery stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://techcastlev.live/kghk
https://805longitudde.digital/wizu
https://hemispherexz.top/xapp
https://equatorf.run/reiq
https://latitudert.live/teui
https://longitudde.digital/wizu
https://climatologfy.top/kbud
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Bolonyokte
Author:Jean-Philippe Teissier / @Jipe_
Description:UnknownDotNet RAT - Bolonyokte
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 8aecd82f1657ec863032e6b326d0c91a7599200a0ef9ba4bfe88a9da5256de8c

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::CopySid
ADVAPI32.dll::EqualSid
ADVAPI32.dll::FreeSid
ADVAPI32.dll::GetLengthSid
ADVAPI32.dll::ImpersonateNamedPipeClient
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CoInitializeSecurity
MULTIMEDIA_APICan Play MultimediaWINMM.dll::PlaySoundW
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::ImpersonateLoggedOnUser
ADVAPI32.dll::PrivilegeCheck
ADVAPI32.dll::SetSecurityDescriptorDacl
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
KERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::WriteProcessMemory
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeA
KERNEL32.dll::GetDriveTypeW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::WriteConsoleA
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::SetConsoleTitleA
KERNEL32.dll::SetStdHandle
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileMappingA
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileMappingW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::GetUserNameW
ADVAPI32.dll::GetUserNameA
ADVAPI32.dll::LogonUserW
ADVAPI32.dll::LookupPrivilegeValueA
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2A
MPR.dll::WNetAddConnection2W
MPR.dll::WNetEnumResourceW
MPR.dll::WNetOpenEnumW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegConnectRegistryA
ADVAPI32.dll::RegConnectRegistryW
ADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegOpenKeyExA
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::ControlService
ADVAPI32.dll::CreateServiceW
ADVAPI32.dll::OpenSCManagerW
ADVAPI32.dll::OpenServiceW
ADVAPI32.dll::QueryServiceStatus
ADVAPI32.dll::StartServiceW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments