MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9e112e2a8ca34f215042f5d331b4f79eca8003fe825594fcbf8936d32e9d2d7c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 17


Intelligence 17 IOCs 2 YARA 3 File information Comments

SHA256 hash: 9e112e2a8ca34f215042f5d331b4f79eca8003fe825594fcbf8936d32e9d2d7c
SHA3-384 hash: 700e13210fdb2f40512b51923b5f85999fa4a6350efcff1e9e786f04530f4a7891e960e324c9e160c6098a34b6026c31
SHA1 hash: 509450e86b22bd823df5d680efc5531b0a9d2a88
MD5 hash: 916eec4e23123e3a1d63ea2daf0c2c14
humanhash: skylark-table-arizona-delaware
File name:916eec4e23123e3a1d63ea2daf0c2c14.exe
Download: download sample
Signature Amadey
File size:4'367'360 bytes
First seen:2025-06-03 11:15:27 UTC
Last seen:2025-06-03 20:11:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 98304:QGXvbV6OQA31eaVfDDipRsefZwxpFFoyGMZEpZvL6RLk:xXvJhhfvqspT9BSZeRLk
Threatray 7 similar samples on MalwareBazaar
TLSH T1001633A7F3EE5814F3B4A7703A7901D33A21FC70A171474F26966A0A58D2E713A607B7
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10522/11/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
46.247.108.161:5135

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
46.247.108.161:5135 https://threatfox.abuse.ch/ioc/1539174/
176.65.142.99:5052 https://threatfox.abuse.ch/ioc/1539175/

Intelligence


File Origin
# of uploads :
5
# of downloads :
550
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
916eec4e23123e3a1d63ea2daf0c2c14.exe
Verdict:
Malicious activity
Analysis date:
2025-06-03 11:17:29 UTC
Tags:
lumma stealer amadey botnet payload loader unlocker-eject tool rat quasar remote telegram rdp github evasion auto-reg arch-exec crypto-regex pastebin

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
phishing autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Creating a file
Creating a window
Searching for synchronization primitives
Searching for the window
Running batch commands
Searching for analyzing tools
Launching a process
Launching a service
DNS request
Connection attempt
Sending an HTTP GET request
Behavior that indicates a threat
Sending a custom TCP request
Connection attempt to an infection source
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context amadey anti-vm CAB crypt explorer installer lolbin lolbin microsoft_visual_cc packed packed packer_detected redcap rundll32 runonce sfx xpack
Result
Threat name:
Amadey, LummaC Stealer, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Drops password protected ZIP file
Found malware configuration
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: PUA - NSudo Execution
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1704823 Sample: xc3Xc2L5sw.exe Startdate: 03/06/2025 Architecture: WINDOWS Score: 100 79 downloadtech.duckdns.org 2->79 81 185.156.72.96 ITDELUXE-ASRU Russian Federation 2->81 83 48 other IPs or domains 2->83 89 Suricata IDS alerts for network traffic 2->89 91 Found malware configuration 2->91 93 Antivirus detection for dropped file 2->93 97 14 other signatures 2->97 13 xc3Xc2L5sw.exe 1 4 2->13         started        16 rundll32.exe 2->16         started        signatures3 95 Uses dynamic DNS services 79->95 process4 file5 75 C:\Users\user\AppData\Local\...\f2f09.exe, PE32 13->75 dropped 77 C:\Users\user\AppData\Local\...\3F66j.exe, PE32 13->77 dropped 18 f2f09.exe 1 4 13->18         started        22 3F66j.exe 1 13->22         started        process6 dnsIp7 57 C:\Users\user\AppData\Local\...\2C1699.exe, PE32 18->57 dropped 59 C:\Users\user\AppData\Local\...\1T30C0.exe, PE32 18->59 dropped 99 Multi AV Scanner detection for dropped file 18->99 25 2C1699.exe 15 18->25         started        29 1T30C0.exe 4 18->29         started        85 185.156.72.2, 49700, 49702, 80 ITDELUXE-ASRU Russian Federation 22->85 87 citellcagt.top 195.82.147.188, 443, 49692, 49694 DREAMTORRENT-CORP-ASRU Russian Federation 22->87 61 C:\Users\user\...\0E337HZEVYKILJAA0GNGU.exe, PE32 22->61 dropped 101 Antivirus detection for dropped file 22->101 103 Detected unpacking (changes PE section rights) 22->103 105 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->105 107 11 other signatures 22->107 file8 signatures9 process10 file11 63 C:\Users\user\AppData\Local\...\nircmd.exe, PE32+ 25->63 dropped 65 C:\Users\user\AppData\Local\...\cecho.exe, PE32 25->65 dropped 67 C:\Users\user\AppData\Local\...67SudoLG.exe, PE32+ 25->67 dropped 71 2 other malicious files 25->71 dropped 113 Multi AV Scanner detection for dropped file 25->113 31 cmd.exe 1 25->31         started        69 C:\Users\user\AppData\Local\...\ramez.exe, PE32 29->69 dropped 115 Contains functionality to start a terminal service 29->115 117 Contains functionality to inject code into remote processes 29->117 34 ramez.exe 29->34         started        signatures12 process13 signatures14 119 Uses cmd line tools excessively to alter registry or file data 31->119 36 cmd.exe 1 31->36         started        39 conhost.exe 31->39         started        121 Multi AV Scanner detection for dropped file 34->121 123 Contains functionality to start a terminal service 34->123 process15 signatures16 109 Uses cmd line tools excessively to alter registry or file data 36->109 41 Unlocker.exe 36->41         started        44 7z.exe 36->44         started        47 cmd.exe 36->47         started        49 31 other processes 36->49 process17 file18 111 Multi AV Scanner detection for dropped file 41->111 51 cmd.exe 41->51         started        73 C:\Users\user\AppData\Local\...\Unlocker.exe, PE32 44->73 dropped 53 tasklist.exe 47->53         started        signatures19 process20 process21 55 conhost.exe 51->55         started       
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-05-21 13:43:46 UTC
File Type:
PE (Exe)
Extracted files:
143
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:lumma family:quasar botnet:8d33eb botnet:office04 credential_access defense_evasion discovery persistence spyware stealer trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies registry key
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Windows directory
Launches sc.exe
Enumerates processes with tasklist
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Obfuscated Files or Information: Command Obfuscation
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Reads user/profile data of local email clients
Downloads MZ/PE file
Uses browser remote debugging
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Amadey family
Lumma Stealer, LummaC
Lumma family
Quasar RAT
Quasar family
Quasar payload
Malware Config
C2 Extraction:
http://185.156.72.96
��tM����Yy�Z�=-�
https://battlefled.top/gaoi
https://narrathfpt.top/tekq
https://escczlv.top/bufi
https://localixbiw.top/zlpa
https://korxddl.top/qidz
https://tinklertjp.bet/nzaf
https://diecam.top/laur/api
https://citellcagt.top/gjtu
https://witchdbhy.run/pzal
46.247.108.161:5135
downloadtech.duckdns.org:5052
Verdict:
Malicious
Tags:
stealer redline Win.Downloader.Amadey-9986882-0 stealc
YARA:
win_redline_wextract_hunting_oct_2023
Unpacked files
SH256 hash:
9e112e2a8ca34f215042f5d331b4f79eca8003fe825594fcbf8936d32e9d2d7c
MD5 hash:
916eec4e23123e3a1d63ea2daf0c2c14
SHA1 hash:
509450e86b22bd823df5d680efc5531b0a9d2a88
SH256 hash:
9b1115326d0fa5e0731d584d183866e8f28ea95944beb2e2f3bd1ee9084c080c
MD5 hash:
cd85e6de702aee6960add112d5143d16
SHA1 hash:
f96ffd41b0dfb152b3c0610a31db92eb5c77b997
SH256 hash:
4afa7c7926fdc7d818b9f6ae0a73a0e470beab0d296560f589087a20e041695f
MD5 hash:
edc3662edd8e5727adec3ccc90915266
SHA1 hash:
8c132e35e03cd000551c0a3739e8a9617a1bacae
Detections:
Amadey
SH256 hash:
290af7b5c50552c8e8746e837ecfa70240e05e5260847c3909821d7d54c4a1b2
MD5 hash:
76906ee982caab0a0d19e3f74954a075
SHA1 hash:
34d080f3610d52d8f1b6bd7b79075d3c142fdf88
SH256 hash:
561aebc926a7b027ced33e3c922dc723db20f422efcb731cbdc7225ea877eabe
MD5 hash:
81b93bb29fba0f91c6bfb2bcdfed82bf
SHA1 hash:
3daea6bb3bf8c815b232d5090fc1b8ec0786aa00
SH256 hash:
cf878bfbd9ed93dc551ac038aff8a8bba4c935ddf8d48e62122bddfdb3e08567
MD5 hash:
426ccb645e50a3143811cfa0e42e2ba6
SHA1 hash:
3c17e212a5fdf25847bc895460f55819bf48b11d
SH256 hash:
5153b60b002a0b82848661b6dc00df9e184ef2a3f800aac3e90f2f868b403c46
MD5 hash:
f99323ccbdf71989e975c21ef85ebe10
SHA1 hash:
bd71d9c530579b5944bfdd1a6a3b1b4f52f4eab3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::EqualSid
ADVAPI32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetDriveTypeA
KERNEL32.dll::GetVolumeInformationA
KERNEL32.dll::GetSystemInfo
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::GetWindowsDirectoryA
KERNEL32.dll::GetSystemDirectoryA
KERNEL32.dll::GetFileAttributesA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryInfoKeyA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::PeekMessageA

Comments