MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8f8b341230323b995c1cde1d534031092bfddb56411dac43d155e5366681e1c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 18


Intelligence 18 IOCs YARA 7 File information Comments

SHA256 hash: 8f8b341230323b995c1cde1d534031092bfddb56411dac43d155e5366681e1c7
SHA3-384 hash: 094dc1147b50a8bde5dcb8f6058a841d7edb274dc3f2c377dc1666bea748a0e8c1895a3d5db6c0e425c4bdb867095683
SHA1 hash: eaf6bbb82054ec30411806eafd927e2dfe2828a6
MD5 hash: 4b8a2ca2c5c007e8e915d1716194933d
humanhash: mango-oscar-uranus-music
File name:8F8B341230323B995C1CDE1D534031092BFDDB56411DA.exe
Download: download sample
Signature Amadey
File size:2'676'643 bytes
First seen:2023-04-07 22:05:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBwPkZVi7iKiF8cUvFyPn+pmtDLgqVaNo1z8ESEwJ84vLRaBtIl9mTMCbsrHH:xSri7ixZUvFyP+EtPfVAo1QEJCvLUBsR
TLSH T18CC533227F92C0FBDA4501348D402FF9A1F9D3D81B1446937344E75EAF78992E426EAB
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://focustopbreed78d.com/ve83dkas2m/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
308
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
http://34.219.68.255/?verify-id=163&verify-hash=fd93751649ac3ea8f8772ba49c8c1fe068002835&verify-msch=R2FtZS1GaXJlLTYzMzI2My1DcmFjay1XaXRoLVNlcmlhbC1OdW1iZXItRnJlZS1Eb3dubG9hZC0yMDIw&download=1&xtrans=MTM4
Verdict:
Malicious activity
Analysis date:
2021-07-23 15:07:51 UTC
Tags:
trojan evasion stealer vidar loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Moving a file to the %temp% subdirectory
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Creating a file
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Launching a process
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
azorult barys installer overlay packed SFX shell32.dll spybot
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nitol, SmokeLoader, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Nitol
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 843365 Sample: 8F8B341230323B995C1CDE1D534... Startdate: 08/04/2023 Architecture: WINDOWS Score: 100 134 Snort IDS alert for network traffic 2->134 136 Multi AV Scanner detection for domain / URL 2->136 138 Malicious sample detected (through community Yara rule) 2->138 140 16 other signatures 2->140 10 8F8B341230323B995C1CDE1D534031092BFDDB56411DA.exe 15 2->10         started        13 rundll32.exe 2->13         started        process3 file4 78 C:\Users\user\AppData\...\setup_install.exe, PE32 10->78 dropped 80 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32+ 10->80 dropped 82 C:\Users\user\AppData\Local\...\sahiba_6.txt, PE32 10->82 dropped 84 10 other files (9 malicious) 10->84 dropped 15 setup_install.exe 1 10->15         started        20 rundll32.exe 13->20         started        process5 dnsIp6 116 lotzini.xyz 15->116 118 127.0.0.1 unknown unknown 15->118 68 C:\Users\user\AppData\...\sahiba_7.exe (copy), PE32+ 15->68 dropped 70 C:\Users\user\AppData\...\sahiba_6.exe (copy), PE32 15->70 dropped 72 C:\Users\user\AppData\...\sahiba_5.exe (copy), PE32 15->72 dropped 74 4 other malicious files 15->74 dropped 120 Antivirus detection for dropped file 15->120 122 Multi AV Scanner detection for dropped file 15->122 124 Detected unpacking (changes PE section rights) 15->124 132 2 other signatures 15->132 22 cmd.exe 1 15->22         started        24 cmd.exe 1 15->24         started        26 cmd.exe 1 15->26         started        35 6 other processes 15->35 126 Writes to foreign memory regions 20->126 128 Allocates memory in foreign processes 20->128 130 Creates a thread in another existing process (thread injection) 20->130 28 svchost.exe 20->28 injected 31 svchost.exe 20->31 injected 33 svchost.exe 20->33 injected 38 12 other processes 20->38 file7 signatures8 process9 dnsIp10 40 sahiba_2.exe 1 22->40         started        44 sahiba_3.exe 47 24->44         started        47 sahiba_6.exe 26->47         started        164 System process connects to network (likely due to code injection or exploit) 28->164 166 Sets debug register (to hijack the execution of another thread) 28->166 168 Modifies the context of a thread in another process (thread injection) 28->168 49 svchost.exe 28->49         started        94 192.168.2.1 unknown unknown 35->94 51 sahiba_1.exe 2 35->51         started        53 sahiba_7.exe 35->53         started        55 sahiba_4.exe 35->55         started        57 sahiba_5.exe 15 3 35->57         started        signatures11 process12 dnsIp13 76 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 40->76 dropped 142 DLL reload attack detected 40->142 144 Detected unpacking (changes PE section rights) 40->144 146 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 40->146 162 4 other signatures 40->162 59 explorer.exe 40->59 injected 110 2 other IPs or domains 44->110 148 Detected unpacking (overwrites its own PE header) 44->148 150 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 44->150 152 Tries to harvest and steal browser information (history, passwords, etc) 44->152 102 212.193.30.115 SPD-NETTR Russian Federation 47->102 112 4 other IPs or domains 47->112 154 May check the online IP address of the machine 47->154 156 Disable Windows Defender real time protection (registry) 47->156 104 google.vrthcobj.com 185.116.193.219 HOSTER-KZ Kazakhstan 49->104 158 Query firmware table information (likely to detect VMs) 49->158 160 Creates processes via WMI 51->160 64 sahiba_1.exe 51->64         started        106 s.lletlee.com 53->106 114 2 other IPs or domains 55->114 108 148.251.234.83 HETZNER-ASDE Germany 57->108 file14 signatures15 process16 dnsIp17 96 103.224.182.242 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 59->96 98 172.104.187.4 LINODE-APLinodeLLCUS United States 59->98 100 2 other IPs or domains 59->100 86 C:\Users\user\AppData\Roaming\icjeveu, PE32 59->86 dropped 170 System process connects to network (likely due to code injection or exploit) 59->170 172 Benign windows process drops PE files 59->172 174 Hides that the sample has been downloaded from the Internet (zone.identifier) 59->174 88 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 64->88 dropped 90 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 64->90 dropped 92 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 64->92 dropped 66 conhost.exe 64->66         started        file18 signatures19 process20
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-07-23 15:48:51 UTC
File Type:
PE (Exe)
Extracted files:
170
AV detection:
28 of 37 (75.68%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:nullmixer family:privateloader family:smokeloader family:vidar botnet:933 botnet:pub5 aspackv2 backdoor dropper evasion loader persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
ASPack v2.12-2.42
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
Modifies Installed Components in the registry
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
NullMixer
PrivateLoader
Process spawned unexpected child process
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://lotzini.xyz/
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
https://shpak125.tumblr.com/
Unpacked files
SH256 hash:
5e3d7e07ffc71d460e601424f50548358759f0f1feb478f7b7428089f0c15323
MD5 hash:
2816d7fa2e712b6117b1db64cfa66de5
SHA1 hash:
e5884d3bb2ce39ed527dddff106b3fa6d7416073
SH256 hash:
8aae79a1ac097cbf578556fd6407838f8be9139294b2f60a1b1f694c18f358e6
MD5 hash:
77676ef9523475862e1ebc3fa4034c40
SHA1 hash:
545433d6ae7d6829425f12252ce1514ad15de0fd
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
c74894fe98864ade516c9e54f2258a23ed451feadfa2de53a7c626385b549b22
MD5 hash:
e44b6cb9e7111de178fbabf3ac1cba76
SHA1 hash:
b15d8d52864a548c42a331a574828824a65763ff
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_auto win_privateloader_a0
SH256 hash:
082626b8bc721202bd4ae6a8b0c795decba4fb2db0ed540d122cd51b5d5cb735
MD5 hash:
55a1c9d70a4eaf77c6c044d241de8c24
SHA1 hash:
a9e5bedae97fc08ffa53fe1937e6464e00b2bac8
SH256 hash:
e7e12d545c5e3ed677f02bda929060c52bedf67ce0ce70db51ee01deb45973ac
MD5 hash:
361f780dac983d1bea4416dcd35c97ad
SHA1 hash:
a86ad8718271005129aa4d8784f5521c62dc5b98
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
09178780a1df7364d0b38580b40ccaa528c3f309bbc0239c98e61d464e8a32f7
MD5 hash:
d2a0c6939e1be294a7a5a0369438dbc4
SHA1 hash:
734eca2ed021b9cf19ca501a8ddf0aaa15692464
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
8a2a1bd110d4aaeeb85a4d82765b74bc73d91ed66fe41ad8a12b477621ddcdfd
MD5 hash:
3dfe901436a8eaca9973bbb80550f839
SHA1 hash:
ae94c5ee1e984d26a8d9940187e6e6e530746f95
SH256 hash:
8f8b341230323b995c1cde1d534031092bfddb56411dac43d155e5366681e1c7
MD5 hash:
4b8a2ca2c5c007e8e915d1716194933d
SHA1 hash:
eaf6bbb82054ec30411806eafd927e2dfe2828a6
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Windows_Trojan_Generic_a681f24a
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments