MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7915e2c423abfd40c013439cc726587a44fc207696637b2a431abce68963dd4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 8


Intelligence 8 IOCs 2 YARA 6 File information Comments

SHA256 hash: b7915e2c423abfd40c013439cc726587a44fc207696637b2a431abce68963dd4
SHA3-384 hash: 259810c4707674661ffda13a5bc3db37030ba1113eaadc3e2f89e30e2c97af6f5b584c29c8dfdabff149f89182894b66
SHA1 hash: 89ea1cbe5189bc86df11c1328e229dd7f3a6c86e
MD5 hash: 7e9acb5b9dd42cebd1bc1fd896730da3
humanhash: five-helium-one-uniform
File name:7E9ACB5B9DD42CEBD1BC1FD896730DA3.exe
Download: download sample
Signature Amadey
File size:2'632'474 bytes
First seen:2021-08-30 03:56:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcB/W2pZACrSaZjfBgNUIk5ZOwE1rmIvARVrxe8+ocT9L0pP5hYSnPdmJ:xsWOCdcriNUIvdIRtE9oc9L0pPdnFQ
TLSH T10FC533213BF1E5FBD58164379B251BB520F9C34C0F3789D32B00291E066AE54E1A7A9E
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://5.181.156.252/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://5.181.156.252/ https://threatfox.abuse.ch/ioc/201911/
91.193.183.72:1203 https://threatfox.abuse.ch/ioc/202131/

Intelligence


File Origin
# of uploads :
1
# of downloads :
344
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://topcracksoft.com
Verdict:
Malicious activity
Analysis date:
2021-08-27 08:01:58 UTC
Tags:
trojan loader stealer rat redline evasion vidar opendir raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Running batch commands
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Sending a UDP request
Launching a process
Deleting a recently created file
Creating a window
Connection attempt to an infection source
Creating a process with a hidden window
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Blocking the Windows Defender launch
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 473657 Sample: uqcDRmIixY.exe Startdate: 30/08/2021 Architecture: WINDOWS Score: 100 135 149.154.167.99 TELEGRAMRU United Kingdom 2->135 137 91.241.19.38 REDBYTES-ASRU Russian Federation 2->137 139 8 other IPs or domains 2->139 189 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->189 191 Multi AV Scanner detection for domain / URL 2->191 193 Antivirus detection for URL or domain 2->193 195 14 other signatures 2->195 11 uqcDRmIixY.exe 17 2->11         started        14 svchost.exe 2->14         started        17 svchost.exe 1 2->17         started        signatures3 process4 dnsIp5 103 C:\Users\user\AppData\...\setup_install.exe, PE32 11->103 dropped 105 C:\Users\user\...\Fri05cb95f8bb00f6e1c.exe, PE32 11->105 dropped 107 C:\Users\user\...\Fri05b4b202015e2b3c.exe, PE32+ 11->107 dropped 109 12 other files (5 malicious) 11->109 dropped 19 setup_install.exe 1 11->19         started        157 23.211.4.86 AKAMAI-ASUS United States 14->157 file6 process7 dnsIp8 141 hsiens.xyz 172.67.142.91, 49707, 80 CLOUDFLARENETUS United States 19->141 143 127.0.0.1 unknown unknown 19->143 145 192.168.2.1 unknown unknown 19->145 197 Performs DNS queries to domains with low reputation 19->197 199 Adds a directory exclusion to Windows Defender 19->199 23 cmd.exe 19->23         started        25 cmd.exe 1 19->25         started        27 cmd.exe 1 19->27         started        29 8 other processes 19->29 signatures9 process10 signatures11 32 Fri05cb95f8bb00f6e1c.exe 23->32         started        37 Fri05acd872029bc7.exe 25->37         started        39 Fri059bb475f9c.exe 87 27->39         started        203 Adds a directory exclusion to Windows Defender 29->203 41 Fri050dad867a09bc1.exe 29->41         started        43 Fri058f479171732c959.exe 29->43         started        45 Fri05b4b202015e2b3c.exe 1 13 29->45         started        47 4 other processes 29->47 process12 dnsIp13 121 37.0.10.237, 49709, 49717, 49728 WKD-ASIE Netherlands 32->121 123 37.0.10.214, 49708, 49716, 80 WKD-ASIE Netherlands 32->123 127 8 other IPs or domains 32->127 67 C:\Users\...\qfdrtsSmG1FTadJaAQ0o5f_z.exe, PE32 32->67 dropped 69 C:\Users\...\YUB927Nv_RKQPhkMiGB1foy1.exe, PE32 32->69 dropped 71 C:\Users\...\X4rQ0CwZ4HU2fw2TB_M8bY4I.exe, PE32 32->71 dropped 81 33 other files (23 malicious) 32->81 dropped 159 Drops PE files to the document folder of the user 32->159 161 May check the online IP address of the machine 32->161 163 Creates HTML files with .exe extension (expired dropper behavior) 32->163 165 Disable Windows Defender real time protection (registry) 32->165 167 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->167 169 Maps a DLL or memory area into another process 37->169 171 Checks if the current machine is a virtual machine (disk enumeration) 37->171 49 explorer.exe 37->49 injected 129 2 other IPs or domains 39->129 83 12 other files (none is malicious) 39->83 dropped 173 Detected unpacking (changes PE section rights) 39->173 175 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 39->175 177 Tries to harvest and steal browser information (history, passwords, etc) 39->177 179 Tries to steal Crypto Currency Wallets 39->179 73 C:\Users\user\...\Fri050dad867a09bc1.tmp, PE32 41->73 dropped 53 Fri050dad867a09bc1.tmp 41->53         started        125 ip-api.com 208.95.112.1, 49710, 80 TUT-ASUS United States 45->125 131 2 other IPs or domains 45->131 75 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 45->75 dropped 133 6 other IPs or domains 47->133 77 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 47->77 dropped 79 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 47->79 dropped 181 Performs DNS queries to domains with low reputation 47->181 183 Creates processes via WMI 47->183 56 LzmwAqmV.exe 47->56         started        file14 signatures15 process16 dnsIp17 85 C:\Users\user\AppData\Roaming\ssjatwd, PE32 49->85 dropped 185 Benign windows process drops PE files 49->185 187 Hides that the sample has been downloaded from the Internet (zone.identifier) 49->187 147 the-flash-man.com 66.29.142.79, 49718, 80 ADVANTAGECOMUS United States 53->147 87 C:\Users\user\AppData\Local\...\zab2our.exe, PE32 53->87 dropped 89 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 53->89 dropped 91 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 53->91 dropped 93 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 53->93 dropped 58 zab2our.exe 53->58         started        95 C:\Users\user\AppData\Local\...\setup_2.exe, PE32 56->95 dropped 97 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 56->97 dropped 99 C:\Users\user\AppData\Local\Temp\jhuuee.exe, PE32+ 56->99 dropped 101 5 other files (none is malicious) 56->101 dropped 63 Chrome 5.exe 56->63         started        65 PBrowFile594.exe 56->65         started        file18 signatures19 process20 dnsIp21 149 173.222.108.226 AKAMAI-ASN1EU United States 58->149 151 162.0.210.44 ACPCA Canada 58->151 153 162.0.220.187 ACPCA Canada 58->153 111 C:\Program Files (x86)\...\Xaebafygada.exe, PE32 58->111 dropped 113 C:\...\Xaebafygada.exe.config, XML 58->113 dropped 115 C:\Users\user\AppData\...\Lepitukaeqy.exe, PE32 58->115 dropped 119 2 other files (none is malicious) 58->119 dropped 201 Creates autostart registry keys with suspicious values (likely registry only malware) 58->201 117 C:\Users\user\AppData\...\services64.exe, PE32+ 63->117 dropped 155 172.67.215.35 CLOUDFLARENETUS United States 65->155 file22 signatures23
Threat name:
ByteCode-MSIL.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-08-27 19:43:06 UTC
AV detection:
31 of 46 (67.39%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:706 botnet:norman aspackv2 backdoor evasion infostealer stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://varmisende.com/upload/
http://fernandomayol.com/upload/
http://nextlytm.com/upload/
http://people4jan.com/upload/
http://asfaltwerk.com/upload/
45.14.49.184:25321
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
7b71364cc50e5a9a1bafa428421348546951153cc095b20b0a6e977d4df35729
MD5 hash:
edbe8e9a533b301dc5e0f30a7fa76fe1
SHA1 hash:
189c4cbb48a37e45c265f2a71f37111746a24084
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
835c9b5e60ebf50a888e851d1c7218d436490613ec04a04055b73fbddf73edf3
MD5 hash:
6961557695f34a53cf8224be7c265fbe
SHA1 hash:
f52d34d0b1dbd181f2acb21f42d875d514afb6f7
SH256 hash:
b9cfc268efef6030809ad7f3b68ff9cdcd9494d76579b02fba59a22f3375c4b0
MD5 hash:
5a8e1bbec3e9f195b6d6d5f1e6bf562c
SHA1 hash:
da18d84c1a9afcd3b38166b303b0ab51dd3d1aac
SH256 hash:
aa210a5c755e1640b4bab66523e67208c3b99af31f8a7ca2a86ed35bb9b9adb5
MD5 hash:
472ac9fa471a5caa467183fcfd297a10
SHA1 hash:
acbb043f63866471d7f1ac897ae18453d9cb9b0b
SH256 hash:
3468617b55f79bcfd39abcab555eee7ec1e71021f2afa65cea500a357b683520
MD5 hash:
82b0b7f1acbeef7bfc42f5cb159cc978
SHA1 hash:
9bee245deb1f7cbc586e8c00836784ed9a35536f
SH256 hash:
fbffb84931a267fab6c24cf08723fa029cb85c2315f01d5b1f41922350adb831
MD5 hash:
052270e8e9cfb3512932e0df484caef4
SHA1 hash:
85305fee690beea8458bab5d55d0368c47340501
SH256 hash:
4fcf3170b5e6f412c821debaa38f51e0d21367961ff2094ab172f01b80eea9ad
MD5 hash:
363fbc868743b15f4816713dc1a0ff99
SHA1 hash:
7f854da1ecc57e9d69322b4942b12e4094819214
SH256 hash:
ed6d502c7c263fd9bd28324f68b287aea158203d0c5154ca07a9bcd059aa2980
MD5 hash:
de595e972bd04cf93648de130f5fb50d
SHA1 hash:
4c05d7c87aa6f95a95709e633f97c715962a52c4
SH256 hash:
ec346d26a3ec12d2aa6cbac2962c04d313b440248a91dd7ca376f3a5f6872302
MD5 hash:
8549e35cd5f1e80f3e4c0633b0baa6c1
SHA1 hash:
42c8db4f02687522b72760fe4ab3536140e07de1
SH256 hash:
eb21aba0fe58e0903891c2aed5d3684cc6291af51d1aaacc050fc019980138cb
MD5 hash:
7b6bb3fd5bf8426e69c2616a52eb2886
SHA1 hash:
10f5a817fd7cf54dbdae929104d88b21eb3e3443
SH256 hash:
52d2310301f360307a71aa5ee3c6b37a94aa42515f1606f1c6607b315db9a9fc
MD5 hash:
114e9d92cfbf54ec3755e9f13d421215
SHA1 hash:
942cb3b032b9fac39f6a2b0cf9d592bc7800cd85
SH256 hash:
9393df2237137dca9659590f33074f5f6d905293cf8c2547560a1cb1c096b1ec
MD5 hash:
12091aa6aa284fe203f698302ff7f2ba
SHA1 hash:
09f55f571bd815628ffd3deb78d74db2a3006210
SH256 hash:
b7915e2c423abfd40c013439cc726587a44fc207696637b2a431abce68963dd4
MD5 hash:
7e9acb5b9dd42cebd1bc1fd896730da3
SHA1 hash:
89ea1cbe5189bc86df11c1328e229dd7f3a6c86e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments