MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 90256ffaecaef72d4ea2147a53d2030dd8bcf3cde5fa5e2dc1f09a58f491b740. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 15


Intelligence 15 IOCs YARA 9 File information Comments

SHA256 hash: 90256ffaecaef72d4ea2147a53d2030dd8bcf3cde5fa5e2dc1f09a58f491b740
SHA3-384 hash: 9d96b09713708d559b19f4f5169ed9389cd23effef67bf8714cb12b38d8eba652ee77fbef1acb53d71794920ce0dbd9f
SHA1 hash: 986e2d3427e5140cd224dd4d7e2f4c608aa6f953
MD5 hash: 43e14b016c4a24d8cc0ecd8ddca196a5
humanhash: red-august-early-idaho
File name:43e14b016c4a24d8cc0ecd8ddca196a5.exe
Download: download sample
Signature Amadey
File size:2'164'224 bytes
First seen:2025-02-08 15:13:31 UTC
Last seen:2025-02-08 15:52:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:EFJiuorHb2Mcfui+rFEYXVxeqJovev8Kd/:6JiuojbevYlxeB4Xd/
TLSH T1D7A5127FFF412F5BDA061AB91A762355996DABC57C38C0B81EB8008D50320C5BF919BB
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:Amadey exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
472
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
43e14b016c4a24d8cc0ecd8ddca196a5.exe
Verdict:
Malicious activity
Analysis date:
2025-02-08 15:16:00 UTC
Tags:
amadey botnet stealer loader telegram themida vidar lumma redline stealc lefthook credentialflusher cryptbot screenconnect remote auto generic autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Searching for the window
Creating a file
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Connection attempt to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
ScreenConnect Tool, Amadey, PureLog Stea
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Contains functionality to inject code into remote processes
Creates HTA files
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Enables network access during safeboot for specific services
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Possible COM Object hijacking
Powershell drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1610117 Sample: pEzwmYoSUs.exe Startdate: 08/02/2025 Architecture: WINDOWS Score: 100 166 Found malware configuration 2->166 168 Malicious sample detected (through community Yara rule) 2->168 170 Antivirus detection for URL or domain 2->170 172 29 other signatures 2->172 9 skotes.exe 6 86 2->9         started        14 pEzwmYoSUs.exe 5 2->14         started        16 msiexec.exe 2->16         started        18 8 other processes 2->18 process3 dnsIp4 148 185.215.113.16 WHOLESALECONNECTIONSNL Portugal 9->148 150 185.215.113.43 WHOLESALECONNECTIONSNL Portugal 9->150 152 185.215.113.97 WHOLESALECONNECTIONSNL Portugal 9->152 98 C:\Users\user\AppData\...\76add6a6a3.exe, PE32 9->98 dropped 100 C:\Users\user\AppData\...\6ed376de24.exe, PE32 9->100 dropped 112 36 other malicious files 9->112 dropped 222 Creates multiple autostart registry keys 9->222 224 Hides threads from debuggers 9->224 226 Tries to detect sandboxes / dynamic malware analysis system (registry check) 9->226 228 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 9->228 20 9f7f22ea34.exe 9->20         started        24 Bjkm5hE.exe 9->24         started        27 1550f10431.exe 9->27         started        35 5 other processes 9->35 102 C:\Users\user\AppData\Local\...\skotes.exe, PE32 14->102 dropped 104 C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII 14->104 dropped 230 Detected unpacking (changes PE section rights) 14->230 232 Tries to evade debugger and weak emulator (self modifying code) 14->232 234 Tries to detect virtualization through RDTSC time measurements 14->234 29 skotes.exe 14->29         started        106 C:\Windows\Installer\MSIE6E3.tmp, PE32 16->106 dropped 108 C:\Windows\Installer\MSIDCB0.tmp, PE32 16->108 dropped 114 8 other files (2 malicious) 16->114 dropped 236 Enables network access during safeboot for specific services 16->236 31 msiexec.exe 16->31         started        37 2 other processes 16->37 154 40.126.32.72 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->154 156 38.240.47.42 COGENT-174US United States 18->156 158 2 other IPs or domains 18->158 110 C:\Users\user\AppData\Local\...\be7scUZeK.hta, HTML 18->110 dropped 238 Suspicious powershell command line found 18->238 240 Tries to download and execute files (via powershell) 18->240 242 Creates HTA files 18->242 244 2 other signatures 18->244 33 mshta.exe 18->33         started        39 4 other processes 18->39 file5 signatures6 process7 dnsIp8 94 C:\Users\user\AppData\Local\...\WswP0QATH.hta, HTML 20->94 dropped 196 2 other signatures 20->196 41 mshta.exe 20->41         started        44 cmd.exe 20->44         started        138 149.154.167.99 TELEGRAMRU United Kingdom 24->138 140 5.75.215.154 HETZNER-ASDE Germany 24->140 182 Multi AV Scanner detection for dropped file 24->182 184 Attempt to bypass Chrome Application-Bound Encryption 24->184 186 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->186 198 3 other signatures 24->198 56 2 other processes 24->56 142 172.67.150.254 CLOUDFLARENETUS United States 27->142 188 Detected unpacking (changes PE section rights) 27->188 200 2 other signatures 27->200 202 3 other signatures 29->202 46 rundll32.exe 31->46         started        190 Suspicious powershell command line found 33->190 204 2 other signatures 33->204 49 powershell.exe 33->49         started        144 103.84.89.222 AISI-AS-APHKAISICLOUDCOMPUTINGLIMITEDHK Hong Kong 35->144 146 104.26.12.31 CLOUDFLARENETUS United States 35->146 96 C:\Users\user\AppData\Local\...\tmpA3AC.tmp, PE32 35->96 dropped 192 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 35->192 206 3 other signatures 35->206 51 1AWhJsY.exe 35->51         started        54 cmd.exe 35->54         started        58 4 other processes 35->58 194 Contains functionality to hide user accounts 39->194 60 3 other processes 39->60 file9 signatures10 process11 dnsIp12 208 Suspicious powershell command line found 41->208 210 Tries to download and execute files (via powershell) 41->210 62 powershell.exe 41->62         started        212 Uses schtasks.exe or at.exe to add and modify task schedules 44->212 66 conhost.exe 44->66         started        68 schtasks.exe 44->68         started        116 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 46->116 dropped 118 C:\...\ScreenConnect.InstallerActions.dll, PE32 46->118 dropped 120 C:\Users\user\...\ScreenConnect.Core.dll, PE32 46->120 dropped 122 Microsoft.Deployme...indowsInstaller.dll, PE32 46->122 dropped 124 Temp0I9KAKPHRPSJLEQEOVXMQVKO43SVNGYU.EXE, PE32 49->124 dropped 70 conhost.exe 49->70         started        132 188.114.97.3 CLOUDFLARENETUS European Union 51->132 214 Query firmware table information (likely to detect VMs) 51->214 216 Tries to harvest and steal ftp login credentials 51->216 218 Tries to steal Crypto Currency Wallets 51->218 126 C:\Temp\3bmScX14g.hta, HTML 54->126 dropped 220 Creates HTA files 54->220 72 cmd.exe 54->72         started        74 cmd.exe 54->74         started        76 cmd.exe 54->76         started        81 2 other processes 54->81 134 239.255.255.250 unknown Reserved 56->134 78 chrome.exe 56->78         started        136 104.208.16.94 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 58->136 128 C:\Users\user\AppData\Local\...\MSICA02.tmp, PE32 58->128 dropped file13 signatures14 process15 dnsIp16 130 TempOKHHIC7OPIYDQARYM8SWOUV1LZV9ZB7Y.EXE, PE32 62->130 dropped 246 Powershell drops PE file 62->246 83 TempOKHHIC7OPIYDQARYM8SWOUV1LZV9ZB7Y.EXE 62->83         started        86 conhost.exe 62->86         started        88 powershell.exe 72->88         started        90 powershell.exe 74->90         started        92 powershell.exe 76->92         started        160 142.250.184.227 GOOGLEUS United States 78->160 162 142.250.185.163 GOOGLEUS United States 78->162 164 4 other IPs or domains 78->164 file17 signatures18 process19 signatures20 174 Detected unpacking (changes PE section rights) 83->174 176 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 83->176 178 Modifies windows update settings 83->178 180 7 other signatures 83->180
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2025-02-08 05:01:10 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:cryptbot family:lumma family:redline family:sectoprat family:stealc botnet:9c9aa5 botnet:cheat botnet:reno credential_access defense_evasion discovery execution infostealer persistence rat spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Windows directory
AutoIT Executable
Enumerates processes with tasklist
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
.NET Reactor proctector
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Uses browser remote debugging
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Amadey family
CryptBot
Cryptbot family
Detects CryptBot payload
Lumma Stealer, LummaC
Lumma family
RedLine
Redline family
SectopRAT
SectopRAT payload
Sectoprat family
Stealc
Stealc family
Malware Config
C2 Extraction:
http://185.215.113.43
103.84.89.222:33791
http://185.215.113.115
https://paleboreei.biz/api
Dropper Extraction:
http://185.215.113.16/mine/random.exe
Unpacked files
SH256 hash:
90256ffaecaef72d4ea2147a53d2030dd8bcf3cde5fa5e2dc1f09a58f491b740
MD5 hash:
43e14b016c4a24d8cc0ecd8ddca196a5
SHA1 hash:
986e2d3427e5140cd224dd4d7e2f4c608aa6f953
SH256 hash:
5a3686f26829d61f000cd920c271cb945c3f71f3b5ca8a91c66879e8a35ad176
MD5 hash:
ddb49e46144fb28156107552dfa93533
SHA1 hash:
1fe00a5a31fa97a5dcc8c0f4e9bd86e66653cc72
Detections:
Amadey win_amadey
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly
Description:Amadey Payload
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Generic_Threat_1f2e969c
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments