MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a89c93b0aba62403a80bd9c958ac6b101f0d71bfae0da9a39538b2b9f711b93c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 17


Intelligence 17 IOCs YARA 47 File information Comments

SHA256 hash: a89c93b0aba62403a80bd9c958ac6b101f0d71bfae0da9a39538b2b9f711b93c
SHA3-384 hash: b9997cd2736aba9e4b597118f2f1d8cd56cf4401684d9aa7e5c90d69dc19e3061d32c6af63b8e81b569a49e3ee53bdc1
SHA1 hash: db46517b2906cc7dbe9f3f477e009476b7fe951c
MD5 hash: 194d36596016f52a59cc6163a5cc1898
humanhash: eleven-eighteen-lake-sierra
File name:194d36596016f52a59cc6163a5cc1898.exe
Download: download sample
Signature Amadey
File size:808'960 bytes
First seen:2024-01-26 15:40:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7515ecf8c0dfa4d230ad835fe0acb57f (18 x Amadey, 4 x RedLineStealer, 2 x RiseProStealer)
ssdeep 24576:zxH5+1N5SnhwQ0iyIakELr0bLObmNrUE6:H84nhllL8obLOSgE6
Threatray 90 similar samples on MalwareBazaar
TLSH T13B0533FE21031842C23AAFF74E4B13049A34787D93A26911587F75A549E48DEEB877CB
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
94.156.67.230:13781

Intelligence


File Origin
# of uploads :
1
# of downloads :
392
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
a89c93b0aba62403a80bd9c958ac6b101f0d71bfae0da9a39538b2b9f711b93c.exe
Verdict:
Malicious activity
Analysis date:
2024-01-26 15:42:12 UTC
Tags:
amadey botnet stealer redline loader stealc risepro fabookie evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Deleting a system file
Running batch commands
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a window
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Searching for the window
Launching a process
Sending a custom TCP request
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Adding an exclusion to Microsoft Defender
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
enigma lolbin obfuscated packed packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
Amadey, Fabookie, Glupteba, LummaC Steal
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Fabookie
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Stealc
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1381767 Sample: n2vzgCmJ7K.exe Startdate: 26/01/2024 Architecture: WINDOWS Score: 100 138 transfer.sh 2->138 140 transfer.adttemp.com.br 2->140 142 10 other IPs or domains 2->142 190 Snort IDS alert for network traffic 2->190 192 Multi AV Scanner detection for domain / URL 2->192 194 Found malware configuration 2->194 196 22 other signatures 2->196 12 n2vzgCmJ7K.exe 1 5 2->12         started        16 svchost.exe 2->16         started        18 explorhe.exe 2->18         started        20 explorhe.exe 2->20         started        signatures3 process4 file5 108 C:\Users\user\AppData\Local\...\explorhe.exe, PE32 12->108 dropped 224 Detected unpacking (changes PE section rights) 12->224 226 Hides threads from debuggers 12->226 228 Contains functionality to detect sleep reduction / modifications 12->228 22 explorhe.exe 50 12->22         started        27 WerFault.exe 16->27         started        29 WerFault.exe 16->29         started        31 WerFault.exe 16->31         started        33 6 other processes 16->33 signatures6 process7 dnsIp8 144 185.215.113.68, 49729, 49730, 49732 WHOLESALECONNECTIONSNL Portugal 22->144 146 109.107.182.3, 49731, 80 TELEPORT-TV-ASRU Russian Federation 22->146 148 185.172.128.19, 49734, 80 NADYMSS-ASRU Russian Federation 22->148 100 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 22->100 dropped 102 C:\Users\user\AppData\Local\Temp\...\moto.exe, PE32+ 22->102 dropped 104 C:\Users\user\AppData\Local\Temp\...\alex.exe, PE32 22->104 dropped 106 21 other malicious files 22->106 dropped 216 Multi AV Scanner detection for dropped file 22->216 218 Detected unpacking (changes PE section rights) 22->218 220 Creates an undocumented autostart registry key 22->220 222 5 other signatures 22->222 35 latestrocki.exe 22->35         started        39 leg221.exe 4 22->39         started        42 2024.exe 22->42         started        44 4 other processes 22->44 file9 signatures10 process11 dnsIp12 92 C:\Users\user\AppData\Local\...\toolspub1.exe, PE32 35->92 dropped 94 C:\Users\user\AppData\Local\Temp\rty25.exe, PE32+ 35->94 dropped 96 C:\Users\user\AppData\...\InstallSetup7.exe, PE32 35->96 dropped 98 2 other malicious files 35->98 dropped 198 Multi AV Scanner detection for dropped file 35->198 46 InstallSetup7.exe 35->46         started        51 toolspub1.exe 35->51         started        53 31839b57a4f11171d6abc8bbc4451ee4.exe 35->53         started        59 3 other processes 35->59 150 80.79.4.61 SISTEMEMD Moldova Republic of 39->150 200 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->200 202 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 39->202 204 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 39->204 152 195.20.16.103 EITADAT-ASFI Finland 42->152 206 Tries to harvest and steal browser information (history, passwords, etc) 42->206 154 braidfadefriendklypk.site 104.21.1.205 CLOUDFLARENETUS United States 44->154 156 consciouosoepewmausj.site 104.21.71.8 CLOUDFLARENETUS United States 44->156 208 System process connects to network (likely due to code injection or exploit) 44->208 210 Query firmware table information (likely to detect VMs) 44->210 212 Writes to foreign memory regions 44->212 214 3 other signatures 44->214 55 conhost.exe 44->55         started        57 conhost.exe 44->57         started        file13 signatures14 process15 dnsIp16 166 185.172.128.90 NADYMSS-ASRU Russian Federation 46->166 168 5.42.64.33 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 46->168 126 C:\Users\user\AppData\Local\...\INetC.dll, PE32 46->126 dropped 128 C:\Users\user\AppData\Local\...\nsiF8C6.tmp, PE32 46->128 dropped 130 C:\Users\user\AppData\...\BroomSetup.exe, PE32 46->130 dropped 132 C:\Users\user\AppData\...\syncUpd[1].exe, PE32 46->132 dropped 172 Multi AV Scanner detection for dropped file 46->172 61 nsiF8C6.tmp 46->61         started        66 BroomSetup.exe 46->66         started        174 Detected unpacking (changes PE section rights) 51->174 176 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 51->176 178 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 51->178 188 3 other signatures 51->188 68 explorer.exe 51->68 injected 180 Detected unpacking (overwrites its own PE header) 53->180 182 Found Tor onion address 53->182 70 WerFault.exe 53->70         started        72 WerFault.exe 53->72         started        74 WerFault.exe 53->74         started        78 5 other processes 53->78 170 i.alie3ksgaa.com 154.92.15.189 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 59->170 134 C:\ProgramData\...\reakuqnanrkn.exe, PE32+ 59->134 dropped 136 C:\Users\...\7a246486dc14b3a22f66d07b9f7064d6, SQLite 59->136 dropped 184 Tries to harvest and steal browser information (history, passwords, etc) 59->184 186 Adds a directory exclusion to Windows Defender 59->186 76 powershell.exe 59->76         started        file17 signatures18 process19 dnsIp20 158 185.172.128.79 NADYMSS-ASRU Russian Federation 61->158 110 C:\Users\user\AppData\...\softokn3[1].dll, PE32 61->110 dropped 112 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 61->112 dropped 114 C:\Users\user\AppData\...\mozglue[1].dll, PE32 61->114 dropped 122 9 other files (5 malicious) 61->122 dropped 230 Detected unpacking (changes PE section rights) 61->230 232 Detected unpacking (overwrites its own PE header) 61->232 234 Tries to steal Mail credentials (via file / registry access) 61->234 244 3 other signatures 61->244 236 Multi AV Scanner detection for dropped file 66->236 80 cmd.exe 66->80         started        160 45.15.156.13 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 68->160 162 146.0.41.68 MYLOC-ASIPBackboneofmyLocmanagedITAGDE Germany 68->162 164 7 other IPs or domains 68->164 116 C:\Users\user\AppData\Roaming\svhehih, PE32 68->116 dropped 118 C:\Users\user\AppData\Local\Temp\F64E.exe, PE32 68->118 dropped 120 C:\Users\user\AppData\Local\Temp\D8A0.exe, PE32+ 68->120 dropped 124 4 other malicious files 68->124 dropped 238 System process connects to network (likely due to code injection or exploit) 68->238 240 Benign windows process drops PE files 68->240 242 Hides that the sample has been downloaded from the Internet (zone.identifier) 68->242 82 conhost.exe 76->82         started        file21 signatures22 process23 process24 84 conhost.exe 80->84         started        86 chcp.com 80->86         started        88 schtasks.exe 80->88         started        90 Conhost.exe 80->90         started       
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2024-01-26 15:41:06 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:glupteba family:redline family:risepro family:smokeloader family:stealc family:zgrat botnet:2024 botnet:@oleh_ps botnet:@pixelscloud botnet:@rlreborn cloud tg: @fatherofcarders) botnet:livetraffic botnet:pub1 backdoor discovery dropper evasion infostealer loader persistence rat spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates processes with tasklist
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Launches sc.exe
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
.NET Reactor proctector
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Themida packer
Creates new service(s)
Downloads MZ/PE file
Modifies Windows Firewall
Stops running service(s)
Amadey
Detect ZGRat V1
Glupteba
Glupteba payload
RedLine
RedLine payload
RisePro
SmokeLoader
Stealc
ZGRat
Malware Config
C2 Extraction:
http://185.215.113.68
195.20.16.103:20440
193.233.132.62:50500
http://185.172.128.79
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
94.156.67.230:13781
141.95.211.148:46011
20.79.30.95:33223
185.172.128.33:8924
Unpacked files
SH256 hash:
a89c93b0aba62403a80bd9c958ac6b101f0d71bfae0da9a39538b2b9f711b93c
MD5 hash:
194d36596016f52a59cc6163a5cc1898
SHA1 hash:
db46517b2906cc7dbe9f3f477e009476b7fe951c
Detections:
SUSP_XORed_URL_In_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly
Description:Amadey Payload
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:Borland
Author:malware-lu
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:crime_ZZ_botnet_aicm
Author:imp0rtp3
Description:DDoS Golang Botnet sample for linux called 'aicm'
Reference:https://twitter.com/IntezerLabs/status/1401869234511175683
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:EnigmaProtector1XSukhovVladimirSergeNMarkin
Author:malware-lu
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:Glupteba
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_DisableWinDefender
Author:ditekSHen
Description:Detects executables containing artifacts associated with disabling Widnows Defender
Rule name:INDICATOR_SUSPICIOUS_EXE_DiscordURL
Author:ditekSHen
Description:Detects executables Discord URL observed in first stage droppers
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL
Author:ditekSHen
Description:Detects executables containing URLs to raw contents of a Github gist
Rule name:INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA
Author:ditekSHen
Description:Detects executables referencing many varying, potentially fake Windows User-Agents
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:SUSP_Websites
Author:SECUINFRA Falcon Team
Description:Detects the reference of suspicious sites that might be used to download further malware
Rule name:SUSP_XORed_URL_In_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UroburosVirtualBoxDriver
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples
Rule name:win_amadey_bytecodes_oct_2023
Author:Matthew @ Embee_Research
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe a89c93b0aba62403a80bd9c958ac6b101f0d71bfae0da9a39538b2b9f711b93c

(this sample)

  
Delivery method
Distributed via web download

Comments