MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 927e564388f0341a0f00afcab7c1fa19b27174781b9e299e45737e6a94151fbe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 15


Intelligence 15 IOCs 2 YARA 12 File information Comments

SHA256 hash: 927e564388f0341a0f00afcab7c1fa19b27174781b9e299e45737e6a94151fbe
SHA3-384 hash: 6478423e9a7100932c54a1fdc6bf91aa7938e7093a0e26148d6cb4a9fd77da28f3b2adbbf01225bff43c68ec0d2f97a4
SHA1 hash: 7ab403058bd5fa8784312d69db32b5b392af0998
MD5 hash: a9d7c2aea7e336548feee78abf8a4ca6
humanhash: pip-zulu-yellow-alanine
File name:a9d7c2aea7e336548feee78abf8a4ca6.exe
Download: download sample
Signature Amadey
File size:332'288 bytes
First seen:2022-06-04 12:36:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7075aebbefb0c25763ed3020e2eb3f06 (1 x Amadey, 1 x GCleaner)
ssdeep 6144:v7najp17OiItO0FkXPzgSgzHeoHO2BwrFiG34MdS+pVaI3iI:vDajNoOqu7gpzm2Be4MdKIyI
TLSH T1DE649D10BBA0C435F6B712F4897983ADB53E79F19B2851CB62D416EE1A356E0EC3134B
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 2dec1378399b9b91 (25 x Smoke Loader, 22 x RedLineStealer, 7 x RaccoonStealer)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://marobast.ws/b3m2fVVs0/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://marobast.ws/b3m2fVVs0/index.php https://threatfox.abuse.ch/ioc/653542/
157.90.242.212:34806 https://threatfox.abuse.ch/ioc/653543/

Intelligence


File Origin
# of uploads :
1
# of downloads :
579
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
a9d7c2aea7e336548feee78abf8a4ca6.exe
Verdict:
Malicious activity
Analysis date:
2022-06-04 12:37:34 UTC
Tags:
trojan loader evasion amadey opendir stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending an HTTP GET request
Creating a file in the %temp% directory
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Sending a custom TCP request
Creating a process from a recently created file
Creating a file
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a window
Sending an HTTP POST request
Delayed reading of the file
Using the Windows Management Instrumentation requests
Launching a tool to kill processes
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed ransomware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, onlyLogger
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Posts data to a JPG file (protocol mismatch)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected onlyLogger
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 639115 Sample: Y8y9rmdN3D.exe Startdate: 04/06/2022 Architecture: WINDOWS Score: 100 72 pinedisc.ws 2->72 74 marobast.ws 2->74 76 generiba.ws 2->76 96 Multi AV Scanner detection for domain / URL 2->96 98 Malicious sample detected (through community Yara rule) 2->98 100 Antivirus detection for URL or domain 2->100 102 10 other signatures 2->102 11 Y8y9rmdN3D.exe 19 2->11         started        16 orxds.exe 2->16         started        18 orxds.exe 2->18         started        20 3 other processes 2->20 signatures3 process4 dnsIp5 90 pinedisc.ws 11->90 92 generiba.ws 11->92 94 3 other IPs or domains 11->94 64 C:\Users\user\AppData\...\7647992337.exe, PE32 11->64 dropped 66 C:\Users\user\AppData\Local\...\a[1].exe, PE32 11->66 dropped 68 C:\Users\user\AppData\...\source2[1].cfg, PE32 11->68 dropped 70 2 other malicious files 11->70 dropped 130 Detected unpacking (changes PE section rights) 11->130 132 Detected unpacking (overwrites its own PE header) 11->132 134 May check the online IP address of the machine 11->134 22 cmd.exe 1 11->22         started        24 cmd.exe 1 11->24         started        file6 signatures7 process8 process9 26 7647992337.exe 3 22->26         started        30 conhost.exe 22->30         started        32 taskkill.exe 1 24->32         started        34 conhost.exe 24->34         started        file10 62 C:\Users\user\AppData\Local\...\orxds.exe, PE32 26->62 dropped 122 Antivirus detection for dropped file 26->122 124 Multi AV Scanner detection for dropped file 26->124 126 Machine Learning detection for dropped file 26->126 128 Contains functionality to inject code into remote processes 26->128 36 orxds.exe 17 26->36         started        signatures11 process12 dnsIp13 78 marobast.ws 34.66.99.9, 49749, 49750, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 36->78 80 pinedisc.ws 36->80 82 3 other IPs or domains 36->82 58 C:\Users\user\AppData\Roaming\...\cred.dll, PE32 36->58 dropped 60 C:\Users\user\AppData\Local\...\cred[1].dll, PE32 36->60 dropped 106 Antivirus detection for dropped file 36->106 108 Multi AV Scanner detection for dropped file 36->108 110 Machine Learning detection for dropped file 36->110 112 Uses schtasks.exe or at.exe to add and modify task schedules 36->112 41 rundll32.exe 36->41         started        45 cmd.exe 1 36->45         started        47 schtasks.exe 1 36->47         started        49 2 other processes 36->49 file14 signatures15 process16 dnsIp17 84 pinedisc.ws 41->84 86 marobast.ws 41->86 88 generiba.ws 41->88 114 System process connects to network (likely due to code injection or exploit) 41->114 116 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 41->116 118 Tries to steal Instant Messenger accounts or passwords 41->118 120 2 other signatures 41->120 51 reg.exe 1 45->51         started        54 conhost.exe 45->54         started        56 conhost.exe 47->56         started        signatures18 process19 signatures20 104 Creates an undocumented autostart registry key 51->104
Threat name:
Win32.Infostealer.Tepfer
Status:
Malicious
First seen:
2022-06-01 23:35:55 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:amadey collection spyware stealer suricata trojan
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_win_path
Enumerates physical storage devices
Program crash
Accesses Microsoft Outlook profiles
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Deletes itself
Loads dropped DLL
Reads local data of messenger clients
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Amadey
Detect Amadey credential stealer module
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Malware Config
C2 Extraction:
marobast.ws/b3m2fVVs0/index.php
pinedisc.ws/b3m2fVVs0/index.php
generiba.ws/b3m2fVVs0/index.php
Unpacked files
SH256 hash:
f2e3f7da78e88a727956f25929ad5ac96b7b3358aee1c1c73fb6e42a519557ce
MD5 hash:
f933e55b27b1cdc8d67744437323be99
SHA1 hash:
3c07c5ca4321fc5f61c7ca2732b412c63e09dc16
SH256 hash:
927e564388f0341a0f00afcab7c1fa19b27174781b9e299e45737e6a94151fbe
MD5 hash:
a9d7c2aea7e336548feee78abf8a4ca6
SHA1 hash:
7ab403058bd5fa8784312d69db32b5b392af0998
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:GoBinTest
Rule name:golang
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File
Author:ditekSHen
Description:Detects executables containing bas64 encoded gzip files
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_References_SecTools
Author:ditekSHen
Description:Detects executables referencing many IR and analysis tools
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments