MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 adf3fb72f8855baa050d1e7c5a15944abeb1ae775570aee6bfab1b2d6ac26a45. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 5 File information Comments

SHA256 hash: adf3fb72f8855baa050d1e7c5a15944abeb1ae775570aee6bfab1b2d6ac26a45
SHA3-384 hash: d0a4ccc96790b9330ff23eb724743bd2b8eb62643a02ababd4868c1d9d9e64e6a57cd80385f2e4a90985891885dcb8dd
SHA1 hash: 108de69ad28a72bbc55cda2fade99275a7bcdda3
MD5 hash: 60c06c9b64be7bb8a25e8391b31bebf9
humanhash: hawaii-xray-robin-orange
File name:adf3fb72f8855baa050d1e7c5a15944abeb1ae775570a.exe
Download: download sample
Signature Amadey
File size:720'384 bytes
First seen:2021-12-05 10:46:16 UTC
Last seen:2021-12-05 12:38:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'741 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:si6NSRRNiQ9jvh1s3y+Vpc7c4ALwoJjvNa4JVkaYOunDwDDFuoNqWQJz:kSRRNi2spx4TUjvNaekaYOun0DD8jWM
Threatray 495 similar samples on MalwareBazaar
TLSH T135E40239186D898CD6B0177D2F2795011C867BEF86BFC5DCBA34D6E247F30860A8E954
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
87.251.73.109:37261

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
87.251.73.109:37261 https://threatfox.abuse.ch/ioc/259581/

Intelligence


File Origin
# of uploads :
2
# of downloads :
446
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
adf3fb72f8855baa050d1e7c5a15944abeb1ae775570a.exe
Verdict:
Malicious activity
Analysis date:
2021-12-05 10:49:03 UTC
Tags:
trojan rat redline amadey

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Running batch commands
Launching a process
Creating a window
Searching for synchronization primitives
Delayed reading of the file
Searching for the window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Amadey RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Posts data to a JPG file (protocol mismatch)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Suspicius Add Task From User AppData Temp
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 534161 Sample: adf3fb72f8855baa050d1e7c5a1... Startdate: 05/12/2021 Architecture: WINDOWS Score: 100 94 github.com 2->94 96 avatars.githubusercontent.com 2->96 118 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->118 120 Multi AV Scanner detection for domain / URL 2->120 122 Antivirus / Scanner detection for submitted sample 2->122 124 12 other signatures 2->124 11 adf3fb72f8855baa050d1e7c5a15944abeb1ae775570a.exe 5 2->11         started        15 tkools.exe 2->15         started        17 tkools.exe 2->17         started        19 tkools.exe 2->19         started        signatures3 process4 file5 82 C:\Users\user\...\a_2021-12-05_10-25.exe, PE32 11->82 dropped 84 C:\Users\user\AppData\Local\...\Fetlocked.exe, PE32 11->84 dropped 86 C:\Users\user\AppData\Local\...\Blatters.exe, PE32 11->86 dropped 88 adf3fb72f8855baa05...b1ae775570a.exe.log, ASCII 11->88 dropped 142 Detected unpacking (overwrites its own PE header) 11->142 21 a_2021-12-05_10-25.exe 4 11->21         started        25 Blatters.exe 2 11->25         started        27 Fetlocked.exe 2 11->27         started        signatures6 process7 file8 78 C:\Users\user\AppData\Local\...\tkools.exe, PE32 21->78 dropped 126 Detected unpacking (changes PE section rights) 21->126 128 Detected unpacking (overwrites its own PE header) 21->128 130 Contains functionality to inject code into remote processes 21->130 29 tkools.exe 17 21->29         started        132 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->132 134 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 25->134 136 Injects a PE file into a foreign processes 25->136 34 Blatters.exe 4 25->34         started        36 conhost.exe 25->36         started        138 Multi AV Scanner detection for dropped file 27->138 38 Fetlocked.exe 27->38         started        40 conhost.exe 27->40         started        signatures9 process10 dnsIp11 108 185.215.113.35, 49709, 49710, 49712 WHOLESALECONNECTIONSNL Portugal 29->108 110 ujx.komawai.ru 81.177.141.85, 49711, 80 RTCOMM-ASRU Russian Federation 29->110 112 cdn.discordapp.com 162.159.129.233, 49714, 80 CLOUDFLARENETUS United States 29->112 90 C:\Users\user\AppData\Local\...\5k20[1].exe, PE32 29->90 dropped 92 C:\Users\user\AppData\...\admintest2[1].exe, PE32 29->92 dropped 144 Detected unpacking (changes PE section rights) 29->144 146 Detected unpacking (overwrites its own PE header) 29->146 148 Uses schtasks.exe or at.exe to add and modify task schedules 29->148 150 Injects a PE file into a foreign processes 29->150 42 tkools.exe 29->42         started        44 cmd.exe 29->44         started        46 tkools.exe 29->46         started        48 schtasks.exe 29->48         started        114 87.251.73.109 ASKONTELRU Russian Federation 34->114 152 Tries to harvest and steal browser information (history, passwords, etc) 34->152 154 Tries to steal Crypto Currency Wallets 34->154 116 185.92.74.32 FOXCLOUDNL Netherlands 38->116 file12 signatures13 process14 process15 50 chrome.exe 42->50         started        53 chrome.exe 42->53         started        55 conhost.exe 42->55         started        57 reg.exe 44->57         started        60 conhost.exe 44->60         started        62 chrome.exe 46->62         started        64 chrome.exe 46->64         started        66 conhost.exe 48->66         started        dnsIp16 98 192.168.2.1 unknown unknown 50->98 100 239.255.255.250 unknown Reserved 50->100 68 chrome.exe 50->68         started        72 chrome.exe 53->72         started        140 Creates an undocumented autostart registry key 57->140 74 chrome.exe 62->74         started        76 chrome.exe 64->76         started        signatures17 process18 dnsIp19 102 accounts.google.com 142.250.185.109 GOOGLEUS United States 68->102 104 googlehosted.l.googleusercontent.com 142.250.186.65 GOOGLEUS United States 68->104 106 8 other IPs or domains 68->106 80 C:\Users\user\AppData\Local\...\Cookies, SQLite 68->80 dropped file20
Threat name:
ByteCode-MSIL.Trojan.RedLineStealer
Status:
Malicious
First seen:
2021-12-05 10:47:14 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:re botnet:svetliy discovery infostealer spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Amadey
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.35/d2VxjasuwS/index.php
87.251.73.109:37261
188.119.113.20:27724
Unpacked files
SH256 hash:
b415cf61ccf2a803e79449558f683967fbab8c5c42d6a76f2360f330fc983f38
MD5 hash:
fab6e108eba5deea12ba31136a170250
SHA1 hash:
74baa1300a92f07980416346a42c1983068cb5b0
SH256 hash:
88d6dbfe1616deac6504817b2b9e7a8e9dfc3d823fd308c66c6a8d5c04a7d8ca
MD5 hash:
be976de1296009a9a1bb6f863bc1c248
SHA1 hash:
41a24c7f21b9f7bc61f6c3af8d19f1c4b9e8615b
SH256 hash:
b388154dd0776198d690f42119d4fb84675c4045a23f65c0141350a176b9a20b
MD5 hash:
3605b02aa274e940b898e66b40686ef3
SHA1 hash:
74d09c50373f0e5d2d9ef9d8a311bc1b4420d009
SH256 hash:
f92fd373020eeb31ba6ff399753e3ceda56507d79b6d7171ae3b2476895cc2a8
MD5 hash:
766aa3be74ccd42b26b75ff99d7fd197
SHA1 hash:
febbfe50a03217047f3bf1ef090bf6618b3de982
SH256 hash:
f8082068c9c0d4c1540cd09b0a81b2f707fa4bbc4d21cfe001a8547c341ab358
MD5 hash:
1562c28dfff594a017943fcdb66593ca
SHA1 hash:
8c2511440f467758ca9d46993b705a226548fdf5
SH256 hash:
557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
MD5 hash:
399289fefce9004754aa98ca823ebc14
SHA1 hash:
402220a50be951b176d233a49e1f302a08857ba7
SH256 hash:
adf3fb72f8855baa050d1e7c5a15944abeb1ae775570aee6bfab1b2d6ac26a45
MD5 hash:
60c06c9b64be7bb8a25e8391b31bebf9
SHA1 hash:
108de69ad28a72bbc55cda2fade99275a7bcdda3
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments