MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b1ba71f8c7c9e46a301ed632e343f1cb58e34f664f051c6c3a940eb607d80ee9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 16


Intelligence 16 IOCs YARA 9 File information Comments

SHA256 hash: b1ba71f8c7c9e46a301ed632e343f1cb58e34f664f051c6c3a940eb607d80ee9
SHA3-384 hash: df2b183d1d52d4e377c455037af901d5df3f5f779b16c293d237e989bce2913073c313e9ac0cc7dd9fa0afb8c6930a1b
SHA1 hash: 0370e6dca61dc4a2b32ba1a8db2a546e5464a21c
MD5 hash: 83e7387cb7462a481df2418a264e2c74
humanhash: alanine-friend-oscar-cup
File name:83e7387cb7462a481df2418a264e2c74.exe
Download: download sample
Signature Amadey
File size:226'010 bytes
First seen:2023-09-07 09:51:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3865972614d44e518713c9a6183fed14 (92 x Amadey, 1 x RedLineStealer, 1 x Backdoor.TeamViewer)
ssdeep 6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Threatray 152 similar samples on MalwareBazaar
TLSH T1EA24F7653916C032D660A1B619F4BFF2C19DA819ABB149DF2B800F77DA112F73970E39
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://77.91.68.52/mac/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
282
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
83e7387cb7462a481df2418a264e2c74.exe
Verdict:
Malicious activity
Analysis date:
2023-09-07 09:54:37 UTC
Tags:
amadey opendir loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Connecting to a non-recommended domain
Sending an HTTP POST request
Adding an access-denied ACE
Enabling autorun by creating a file
Gathering data
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
greyware lolbin overlay shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Mystic Stealer, RedLine, SmokeLo
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1305721 Sample: oZAPF1gCzM.exe Startdate: 07/09/2023 Architecture: WINDOWS Score: 100 130 tse1.mm.bing.net 2->130 146 Snort IDS alert for network traffic 2->146 148 Malicious sample detected (through community Yara rule) 2->148 150 Antivirus detection for URL or domain 2->150 152 12 other signatures 2->152 15 oZAPF1gCzM.exe 4 2->15         started        19 explonde.exe 2->19         started        21 explonde.exe 2->21         started        23 dfcrteb 2->23         started        signatures3 process4 file5 128 C:\Users\user\AppData\Local\...\explonde.exe, PE32 15->128 dropped 138 Contains functionality to inject code into remote processes 15->138 25 explonde.exe 1 20 15->25         started        signatures6 process7 dnsIp8 134 77.91.68.52, 49721, 49722, 49724 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 25->134 136 77.91.124.231, 49723, 49777, 49791 ECOTEL-ASRU Russian Federation 25->136 112 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 25->112 dropped 114 C:\Users\user\AppData\Local\Temp\...\zur.exe, PE32 25->114 dropped 116 C:\Users\user\AppData\Local\...\zur[1].exe, PE32 25->116 dropped 118 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 25->118 dropped 180 Antivirus detection for dropped file 25->180 182 Multi AV Scanner detection for dropped file 25->182 184 Creates an undocumented autostart registry key 25->184 186 2 other signatures 25->186 30 zur.exe 1 25->30         started        33 cmd.exe 1 25->33         started        35 schtasks.exe 1 25->35         started        37 rundll32.exe 25->37         started        file9 signatures10 process11 signatures12 198 Machine Learning detection for dropped file 30->198 200 Writes to foreign memory regions 30->200 202 Allocates memory in foreign processes 30->202 204 Injects a PE file into a foreign processes 30->204 39 AppLaunch.exe 30->39         started        42 WerFault.exe 23 9 30->42         started        44 conhost.exe 30->44         started        46 cacls.exe 1 33->46         started        48 conhost.exe 33->48         started        50 cmd.exe 1 33->50         started        54 4 other processes 33->54 52 conhost.exe 35->52         started        process13 signatures14 166 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 39->166 168 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 39->168 170 Maps a DLL or memory area into another process 39->170 172 2 other signatures 39->172 56 explorer.exe 10 6 39->56 injected 61 conhost.exe 42->61         started        63 AppLaunch.exe 42->63         started        65 WerFault.exe 42->65         started        67 WerFault.exe 46->67         started        69 WerFault.exe 46->69         started        71 WerFault.exe 46->71         started        73 WerFault.exe 46->73         started        process15 dnsIp16 132 77.91.68.29, 49775, 49789, 49799 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 56->132 106 C:\Users\user\AppData\Roaming\dfcrteb, PE32 56->106 dropped 108 C:\Users\user\AppData\Local\Temp\AA9F.exe, PE32 56->108 dropped 110 C:\Users\user\AppData\Local\Temp\2597.exe, PE32 56->110 dropped 174 System process connects to network (likely due to code injection or exploit) 56->174 176 Benign windows process drops PE files 56->176 178 Hides that the sample has been downloaded from the Internet (zone.identifier) 56->178 75 AA9F.exe 56->75         started        79 zur.exe 56->79         started        81 zur.exe 56->81         started        file17 signatures18 process19 file20 120 C:\Users\user\AppData\Local\...\x3219598.exe, PE32 75->120 dropped 122 C:\Users\user\AppData\Local\...\k3874765.exe, PE32 75->122 dropped 188 Antivirus detection for dropped file 75->188 190 Machine Learning detection for dropped file 75->190 83 x3219598.exe 75->83         started        192 Writes to foreign memory regions 79->192 194 Allocates memory in foreign processes 79->194 196 Injects a PE file into a foreign processes 79->196 87 AppLaunch.exe 79->87         started        89 conhost.exe 79->89         started        91 WerFault.exe 79->91         started        signatures21 process22 file23 102 C:\Users\user\AppData\Local\...\x2405975.exe, PE32 83->102 dropped 104 C:\Users\user\AppData\Local\...\j4692670.exe, PE32 83->104 dropped 154 Antivirus detection for dropped file 83->154 156 Machine Learning detection for dropped file 83->156 93 x2405975.exe 83->93         started        158 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 87->158 160 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 87->160 162 Maps a DLL or memory area into another process 87->162 164 2 other signatures 87->164 signatures24 process25 file26 124 C:\Users\user\AppData\Local\...\i6764630.exe, PE32 93->124 dropped 126 C:\Users\user\AppData\Local\...\g6933036.exe, PE32 93->126 dropped 206 Antivirus detection for dropped file 93->206 208 Machine Learning detection for dropped file 93->208 97 g6933036.exe 93->97         started        signatures27 process28 signatures29 140 Writes to foreign memory regions 97->140 142 Allocates memory in foreign processes 97->142 144 Injects a PE file into a foreign processes 97->144 100 conhost.exe 97->100         started        process30
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2023-09-07 09:52:05 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 23 (95.65%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey trojan
Behaviour
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Amadey
Malware Config
C2 Extraction:
77.91.68.52/mac/index.php
Unpacked files
SH256 hash:
b1ba71f8c7c9e46a301ed632e343f1cb58e34f664f051c6c3a940eb607d80ee9
MD5 hash:
83e7387cb7462a481df2418a264e2c74
SHA1 hash:
0370e6dca61dc4a2b32ba1a8db2a546e5464a21c
Detections:
Amadey
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly
Description:Amadey Payload
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_Amadey
Author:ditekSHen
Description:Amadey downloader payload
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Amadey_7abb059b
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples
Rule name:win_amadey_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.amadey.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe b1ba71f8c7c9e46a301ed632e343f1cb58e34f664f051c6c3a940eb607d80ee9

(this sample)

  
Delivery method
Distributed via web download

Comments