MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a62e5c321acf5b890bd7a235ea62b8a4061e9ceb1273310ac5ccae57d583cc5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 18


Intelligence 18 IOCs YARA 26 File information Comments

SHA256 hash: a62e5c321acf5b890bd7a235ea62b8a4061e9ceb1273310ac5ccae57d583cc5e
SHA3-384 hash: d9dbc7a6f55fe909c850e36029e1402141e504ab9fe4a0bf152635d8ed172ef8d15d8d61af738e8730f0d7de0da8dc63
SHA1 hash: 4df0f013eff1c16fd0bfae00c4738a433b11b866
MD5 hash: 57d5f9084e85136726b91aeea40d6855
humanhash: triple-three-double-don
File name:HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe
Download: download sample
Signature Amadey
File size:3'219'444 bytes
First seen:2023-01-16 18:35:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 49152:EgmUPjwG716Gij9smMXGeX9kgS49XCWNB1LbsVRNwVFrysBPY5sHXZT1laZqs8dq:JHjy5smnea9W7dsVRNwVFrysfJnaMsv3
Threatray 2'675 similar samples on MalwareBazaar
TLSH T1AEE533121F274865D8E7037C2F51170752AC8223198D5B4EA7B1DE2A8EB5AC6E1DE33B
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://62.204.41.27/9djZdj09/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
260
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
socelars
ID:
1
File name:
HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe
Verdict:
Malicious activity
Analysis date:
2023-01-16 18:35:31 UTC
Tags:
evasion trojan socelars stealer loader amadey rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Fabookie Infostealer
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Moving a recently created file
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Launching a process
Reading critical registry keys
Sending an HTTP GET request
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Query of malicious DNS domain
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys glupteba overlay packed shell32.dll vidar
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Amadey, Backstage Stealer, PrivateLoader
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Writes a notice file (html or txt) to demand a ransom
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Backstage Stealer
Yara detected Generic Downloader
Yara detected PrivateLoader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 785308 Sample: HEUR-Trojan-Downloader.Win3... Startdate: 16/01/2023 Architecture: WINDOWS Score: 100 152 Snort IDS alert for network traffic 2->152 154 Multi AV Scanner detection for domain / URL 2->154 156 Malicious sample detected (through community Yara rule) 2->156 158 22 other signatures 2->158 12 HEUR-Trojan-Downloader.Win32.Zenlod.gen-a62e5.exe 10 2->12         started        process3 file4 102 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->102 dropped 15 setup_installer.exe 15 12->15         started        process5 file6 104 C:\Users\user\AppData\Local\...\sotema_7.txt, PE32 15->104 dropped 106 C:\Users\user\AppData\Local\...\sotema_6.txt, PE32 15->106 dropped 108 C:\Users\user\AppData\Local\...\sotema_5.txt, PE32 15->108 dropped 110 10 other files (9 malicious) 15->110 dropped 142 Multi AV Scanner detection for dropped file 15->142 144 Writes a notice file (html or txt) to demand a ransom 15->144 19 setup_install.exe 1 15->19         started        signatures7 process8 dnsIp9 134 razino.xyz 19->134 136 127.0.0.1 unknown unknown 19->136 94 C:\Users\user\AppData\...\sotema_7.exe (copy), PE32 19->94 dropped 96 C:\Users\user\AppData\...\sotema_6.exe (copy), PE32 19->96 dropped 98 C:\Users\user\AppData\...\sotema_5.exe (copy), PE32 19->98 dropped 100 4 other malicious files 19->100 dropped 194 Antivirus detection for dropped file 19->194 196 Multi AV Scanner detection for dropped file 19->196 198 Detected unpacking (changes PE section rights) 19->198 200 2 other signatures 19->200 24 cmd.exe 1 19->24         started        26 cmd.exe 1 19->26         started        28 cmd.exe 1 19->28         started        30 6 other processes 19->30 file10 signatures11 process12 dnsIp13 33 sotema_6.exe 24->33         started        38 sotema_2.exe 1 26->38         started        40 sotema_1.exe 5 28->40         started        140 20.189.173.22 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->140 42 sotema_4.exe 1 30->42         started        44 sotema_3.exe 12 30->44         started        46 sotema_7.exe 30->46         started        48 sotema_5.exe 30->48         started        process14 dnsIp15 112 212.193.30.115 SPD-NETTR Russian Federation 33->112 114 136.144.41.133, 80 WORLDSTREAMNL Netherlands 33->114 120 15 other IPs or domains 33->120 78 C:\Users\...\srsu7I9cgJbYPb8YKpGkmLIx.exe, PE32 33->78 dropped 80 C:\Users\...\qFctE8kmGxga8b19wu86eM_b.exe, PE32 33->80 dropped 82 C:\Users\...\fKDJu0cdK1HpVCAroA2ZXopm.exe, PE32 33->82 dropped 90 15 other malicious files 33->90 dropped 160 Drops PE files to the document folder of the user 33->160 162 Creates HTML files with .exe extension (expired dropper behavior) 33->162 164 Disable Windows Defender real time protection (registry) 33->164 84 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 38->84 dropped 166 DLL reload attack detected 38->166 168 Detected unpacking (changes PE section rights) 38->168 170 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 38->170 178 4 other signatures 38->178 50 explorer.exe 38->50 injected 86 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 40->86 dropped 55 rundll32.exe 40->55         started        116 99.83.154.118 AMAZON-02US United States 42->116 122 3 other IPs or domains 42->122 88 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 42->88 dropped 172 May check the online IP address of the machine 42->172 57 jfiag3g_gg.exe 42->57         started        59 jfiag3g_gg.exe 42->59         started        124 2 other IPs or domains 44->124 174 Detected unpacking (overwrites its own PE header) 44->174 61 WerFault.exe 44->61         started        176 Injects a PE file into a foreign processes 46->176 63 sotema_7.exe 46->63         started        118 148.251.234.83 HETZNER-ASDE Germany 48->118 file16 signatures17 process18 dnsIp19 126 204.11.56.48 CONFLUENCE-NETWORK-INCVG Virgin Islands (BRITISH) 50->126 128 206.119.99.162 COGENT-174US United States 50->128 130 45.200.38.91 Africa-on-Cloud-ASZA Seychelles 50->130 92 C:\Users\user\AppData\Roaming\ufvitgu, PE32 50->92 dropped 180 System process connects to network (likely due to code injection or exploit) 50->180 182 Benign windows process drops PE files 50->182 184 Hides that the sample has been downloaded from the Internet (zone.identifier) 50->184 186 Writes to foreign memory regions 55->186 188 Allocates memory in foreign processes 55->188 190 Creates a thread in another existing process (thread injection) 55->190 65 svchost.exe 55->65 injected 68 svchost.exe 55->68 injected 70 svchost.exe 55->70 injected 72 9 other processes 55->72 192 Multi AV Scanner detection for dropped file 57->192 132 52.182.143.212 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 61->132 file20 signatures21 process22 signatures23 146 System process connects to network (likely due to code injection or exploit) 65->146 148 Sets debug register (to hijack the execution of another thread) 65->148 150 Modifies the context of a thread in another process (thread injection) 65->150 74 svchost.exe 65->74         started        process24 dnsIp25 138 email.yg9.me 35.241.7.66 GOOGLEUS United States 74->138 202 Query firmware table information (likely to detect VMs) 74->202 signatures26
Threat name:
Win32.Spyware.Vidar
Status:
Malicious
First seen:
2021-07-01 07:01:53 UTC
File Type:
PE (Exe)
Extracted files:
192
AV detection:
28 of 36 (77.78%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:dcrat family:fabookie family:gcleaner family:nullmixer family:privateloader family:raccoon family:redline family:smokeloader family:vidar botnet:1 botnet:64b445f2d85b7aeb3d5c7b23112d6ac3 botnet:706 botnet:@new@2023 botnet:andriii_ff botnet:domani2 botnet:gula botnet:logsdiller cloud (tg: @logsdillabot) botnet:medi2 aspackv2 backdoor brand:microsoft discovery dropper evasion infostealer loader persistence phishing rat spyware stealer themida trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Detected potential entity reuse from brand microsoft.
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Unexpected DNS network traffic destination
Uses the VBS compiler for execution
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Nirsoft
Vidar Stealer
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Amadey
DcRat
Detect Fabookie payload
Detects Smokeloader packer
Fabookie
GCleaner
Modifies Windows Defender Real-time Protection settings
NullMixer
PrivateLoader
Raccoon
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
http://razino.xyz/
https://sergeevih43.tumblr.com/
flestriche.xyz:80
77.73.133.62:22344
62.204.41.211:4065
185.244.181.112:33056
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
51.210.137.6:47909
62.204.41.27/9djZdj09/index.php
http://45.15.156.209/
167.235.156.206:6218
librchichelpai.shop:81
rniwondunuifac.shop:81
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
88d629dddea8dfdd05fc95df6127ea1f4dba39aaebda4c92b54d26e0524c8d06
MD5 hash:
a4c3b30c70ed966388d45e81f007c7da
SHA1 hash:
d42151845d43b672909dc7a6cedf9839985ccf5f
SH256 hash:
ac8f84b82cde11ea518aa7334b3a3ef486b6c3a702ce82652de023b0060fa2e5
MD5 hash:
93478396f89d02930d44d9a797ba1800
SHA1 hash:
20ba0d4594ac9237cfd11ee057d7f995a624cb31
SH256 hash:
345b4cb2e9180617be7a44a8eb11e829aa9180428a5afd830b21c308d6f7b43d
MD5 hash:
e0bcfe87f2948129113c7423dd3606fe
SHA1 hash:
0b5fe4fd2ca148a0345fd7a1f1e0228be1127462
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
adb98685d3d6a8fa5e90b6fd9d458601d874718d5815f8aab66728ba9d067440
MD5 hash:
987d0f92ed9871031e0061e16e7bbac4
SHA1 hash:
b69f3badc82b6da0ff311f9dc509bac244464332
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_auto win_privateloader_a0
SH256 hash:
cc554490c09b1e5e7e6494142b79c438ef720c322668adac0857c40945cda946
MD5 hash:
d91768fa0c2a83ec2793c1df2d291709
SHA1 hash:
b161a5699b2402f1a7c6d6896148e65ceb58c14a
SH256 hash:
2b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
MD5 hash:
5632c0cda7da1c5b57aeffeead5c40b7
SHA1 hash:
533805ba88fbd008457616ae2c3b585c952d3afe
SH256 hash:
d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
MD5 hash:
7b61795697b50fb19d1f20bd8a234b67
SHA1 hash:
5134692d456da79579e9183c50db135485e95201
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
601968aa84fe6398824a54135510bcc8c3d4fb0a23d586b5d01862c265506918
MD5 hash:
8400e6c9df7ec3f199c2031925eb6ec3
SHA1 hash:
37ab88147190982e4f8d064876aabf93ee709db9
SH256 hash:
a62e5c321acf5b890bd7a235ea62b8a4061e9ceb1273310ac5ccae57d583cc5e
MD5 hash:
57d5f9084e85136726b91aeea40d6855
SHA1 hash:
4df0f013eff1c16fd0bfae00c4738a433b11b866
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AsyncRat_Detection_Dec_2022
Author:Potatech
Description:AsyncRat
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Mal_InfoStealer_Win32_RedLine_Unobfuscated_2021
Author:BlackBerry Threat Research Team
Description:Detects Unobfuscated RedLine Infostealer Executables (.NET)
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_imphash
Rule name:Redline32
Author:Muffin
Description:This rule detects Redline Stealer
Rule name:RedLine_a
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Windows_Trojan_Generic_a681f24a
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_f54632eb
Author:Elastic Security
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_114258d5
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_9007feb2
Author:Elastic Security
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments