MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 94c64f12afd02a13f709021efe6a3676f92ee6ea68ea91b67e476ba603c0b79b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: 94c64f12afd02a13f709021efe6a3676f92ee6ea68ea91b67e476ba603c0b79b
SHA3-384 hash: a9bf96c0eca30eb693fea396de429df51c2589b68847495f2ba5cf3bcd840a8ec95260747e62c2b4a76f9496c0d06944
SHA1 hash: 09e4757a3a48afac86e209fcb6ecc90928779189
MD5 hash: c9c6cc53814888017203cbc28c3ef873
humanhash: floor-early-low-bulldog
File name:94c64f12afd02a13f709021efe6a3676f92ee6ea68ea9.exe
Download: download sample
Signature Amadey
File size:1'773'056 bytes
First seen:2022-09-25 06:40:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cea7ae85c87ddc7295d39ff9cda31d1 (85 x RedLineStealer, 67 x LummaStealer, 61 x Rhadamanthys)
ssdeep 24576:CczJ8CgMbMdHYwxTIQc1FSNIQ64hcvcPyvI3OJzAlvCsxT7BBA7LOo:RJ8Hd4wxTIQgch6VUP6SqzAgsah
TLSH T14C85ABC173958057ED679A305E97938E8729FCD5BE35728B3224F34E0B3AAD24E69700
TrID 83.7% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
7.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
4.4% (.EXE) Win64 Executable (generic) (10523/12/4)
2.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.8% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://210.16.67.250/f5OknW/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://210.16.67.250/f5OknW/index.php https://threatfox.abuse.ch/ioc/851527/

Intelligence


File Origin
# of uploads :
1
# of downloads :
382
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Launching a process
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
60%
Tags:
advpack.dll packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, SmokeLoader
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates an undocumented autostart registry key
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 709303 Sample: 94c64f12afd02a13f709021efe6... Startdate: 25/09/2022 Architecture: WINDOWS Score: 100 82 Snort IDS alert for network traffic 2->82 84 Multi AV Scanner detection for domain / URL 2->84 86 Antivirus detection for URL or domain 2->86 88 10 other signatures 2->88 11 94c64f12afd02a13f709021efe6a3676f92ee6ea68ea9.exe 1 3 2->11         started        14 rundll32.exe 2->14         started        16 rovwer.exe 2->16         started        process3 file4 76 C:\Users\user\AppData\Local\...\SETUP_~1.EXE, PE32 11->76 dropped 18 SETUP_~1.EXE 5 11->18         started        process5 file6 62 C:\...\Xtumbbzmzpeuiihwwafgsthinktitle_s.exe, PE32 18->62 dropped 100 Encrypted powershell cmdline option found 18->100 102 Injects a PE file into a foreign processes 18->102 22 SETUP_~1.EXE 3 18->22         started        25 Xtumbbzmzpeuiihwwafgsthinktitle_s.exe 4 18->25         started        28 powershell.exe 16 18->28         started        signatures7 process8 file9 66 C:\Users\user\AppData\Local\...\rovwer.exe, PE32 22->66 dropped 30 rovwer.exe 4 22->30         started        104 Machine Learning detection for dropped file 25->104 106 Encrypted powershell cmdline option found 25->106 108 Injects a PE file into a foreign processes 25->108 33 powershell.exe 13 25->33         started        35 Xtumbbzmzpeuiihwwafgsthinktitle_s.exe 25->35         started        37 conhost.exe 28->37         started        signatures10 process11 signatures12 112 Multi AV Scanner detection for dropped file 30->112 114 Encrypted powershell cmdline option found 30->114 116 Uses schtasks.exe or at.exe to add and modify task schedules 30->116 118 Injects a PE file into a foreign processes 30->118 39 rovwer.exe 30->39         started        44 powershell.exe 30->44         started        46 conhost.exe 33->46         started        48 explorer.exe 35->48 injected process13 dnsIp14 78 210.16.67.250, 49698, 49699, 80 ITEXTRON-AS-APTEXTRONCORPORATIONPH Japan 39->78 80 51.161.11.58, 49700, 80 OVHFR Canada 39->80 68 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32 39->68 dropped 70 C:\Users\user\AppData\...\mine1cry.exe, PE32+ 39->70 dropped 72 C:\Users\user\AppData\...\stelcrypt.exe, PE32 39->72 dropped 74 9 other malicious files 39->74 dropped 110 Creates an undocumented autostart registry key 39->110 50 rundll32.exe 39->50         started        53 aa.exe 39->53         started        56 schtasks.exe 39->56         started        58 conhost.exe 44->58         started        file15 signatures16 process17 file18 90 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 50->90 92 Tries to steal Instant Messenger accounts or passwords 50->92 94 Tries to steal Mail credentials (via file / registry access) 50->94 96 Tries to harvest and steal ftp login credentials 50->96 64 C:\Users\user\AppData\Local\...\SETUP_~1.EXE, PE32 53->64 dropped 98 Antivirus detection for dropped file 53->98 60 conhost.exe 56->60         started        signatures19 process20
Threat name:
Win64.Packed.Generic
Status:
Suspicious
First seen:
2022-09-25 06:42:25 UTC
File Type:
PE+ (Exe)
Extracted files:
27
AV detection:
17 of 26 (65.38%)
Threat level:
  1/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor persistence trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Detects Smokeloader packer
SmokeLoader
Unpacked files
SH256 hash:
94c64f12afd02a13f709021efe6a3676f92ee6ea68ea91b67e476ba603c0b79b
MD5 hash:
c9c6cc53814888017203cbc28c3ef873
SHA1 hash:
09e4757a3a48afac86e209fcb6ecc90928779189
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 94c64f12afd02a13f709021efe6a3676f92ee6ea68ea91b67e476ba603c0b79b

(this sample)

  
Delivery method
Distributed via web download

Comments