MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb1aa29dca7c55add0bd5e53c735645b5cd0d5ab5105fd412026fa2c69e06191. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 15


Intelligence 15 IOCs YARA 11 File information Comments

SHA256 hash: bb1aa29dca7c55add0bd5e53c735645b5cd0d5ab5105fd412026fa2c69e06191
SHA3-384 hash: 45bea8bb3cb35e81b49f8b0c8b2cfc4b301a7ba522d6813f9b1facd99da1b9c6e16ed84c1f95ac066399552447f192c3
SHA1 hash: 58729230e6520598c5b1e631ec58b25ab4253e9e
MD5 hash: 55c8c7b199c0c7a793f0b24315ef88bb
humanhash: spaghetti-pasta-bravo-oven
File name:file
Download: download sample
Signature Amadey
File size:960'512 bytes
First seen:2023-06-21 02:09:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:i93LjHoWUIxua+I2OOzb9pxjRssqNlLv9+awpdVDVVp:ItzsahojxjRAlLvcNVDVV
Threatray 2'954 similar samples on MalwareBazaar
TLSH T14A15E25C0E4F5196F1BAFC22BDE5EAD7709711911E9186A4039F0BA60CFA344F1E2EB1
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter andretavare5
Tags:Amadey exe


Avatar
andretavare5
Sample downloaded from http://45.9.74.80/undoo.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
294
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
https://finest.co.ke/wp-content/download/File_pass1234.7z
Verdict:
Malicious activity
Analysis date:
2023-06-20 18:57:08 UTC
Tags:
privateloader loader evasion stealer rat redline fabookie amadey trojan gcleaner raccoon recordbreaker

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
Creating a window
Searching for synchronization primitives
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Searching for the window
Launching a process
Launching cmd.exe command interpreter
Adding an access-denied ACE
Query of malicious DNS domain
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Fabookie, Glupteba, Nymaim, Priv
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates files in the system32 config directory
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS TXT record lookups
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses STUN server to do NAT traversial
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Fabookie
Yara detected Glupteba
Yara detected Nymaim
Yara detected PrivateLoader
Yara detected SmokeLoader
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 891764 Sample: file.exe Startdate: 21/06/2023 Architecture: WINDOWS Score: 100 158 45.12.253.72 CMCSUS Germany 2->158 160 45.12.253.75 CMCSUS Germany 2->160 162 45.12.253.98 CMCSUS Germany 2->162 202 Snort IDS alert for network traffic 2->202 204 Multi AV Scanner detection for domain / URL 2->204 206 Found malware configuration 2->206 208 19 other signatures 2->208 13 file.exe 5 2->13         started        16 ssrcstu 2->16         started        19 svchost.exe 2->19         started        21 3 other processes 2->21 signatures3 process4 file5 150 C:\Users\user\AppData\Local\Temp\ss41.exe, PE32+ 13->150 dropped 152 C:\Users\user\AppData\Local\...\newplayer.exe, PE32 13->152 dropped 154 C:\Users\user\AppData\Local\...\3bbaaf7b.exe, PE32 13->154 dropped 156 C:\Users\user\AppData\Local\...\file.exe.log, CSV 13->156 dropped 23 newplayer.exe 3 13->23         started        27 3bbaaf7b.exe 13->27         started        29 ss41.exe 14 13->29         started        194 Detected unpacking (changes PE section rights) 16->194 196 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 16->196 198 Maps a DLL or memory area into another process 16->198 200 2 other signatures 16->200 32 WerFault.exe 19->32         started        34 WerFault.exe 19->34         started        36 WerFault.exe 19->36         started        38 4 other processes 19->38 signatures6 process7 dnsIp8 126 C:\Users\user\AppData\Local\...\oneetx.exe, PE32 23->126 dropped 226 Multi AV Scanner detection for dropped file 23->226 40 oneetx.exe 27 23->40         started        228 Detected unpacking (changes PE section rights) 27->228 230 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 27->230 232 Maps a DLL or memory area into another process 27->232 240 2 other signatures 27->240 45 explorer.exe 27->45 injected 188 ji.jaoaaoas11.com 154.221.19.146, 49702, 49708, 49710 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 29->188 190 as.imgjeoigaa.com 39.109.117.57, 49704, 49705, 49709 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 29->190 192 us.imgjeoigaa.com 29->192 128 C:\Users\...\38247103e6a6ad2162cab4cbfd3921fe, SQLite 29->128 dropped 234 Detected unpacking (creates a PE file in dynamic memory) 29->234 236 Contains functionality to steal Chrome passwords or cookies 29->236 238 Tries to harvest and steal browser information (history, passwords, etc) 29->238 47 taskkill.exe 1 29->47         started        49 taskkill.exe 29->49         started        file9 signatures10 process11 dnsIp12 170 45.9.74.80, 49703, 49706, 49707 FIRST-SERVER-EU-ASRU Russian Federation 40->170 172 ji.jaoaaoas11.com 40->172 178 4 other IPs or domains 40->178 130 C:\...\c53cfff621a84792162f70e790980e38.exe, PE32 40->130 dropped 132 C:\Users\user\AppData\Local\Temp\...\ss41.exe, PE32+ 40->132 dropped 134 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 40->134 dropped 140 5 other malicious files 40->140 dropped 242 Multi AV Scanner detection for dropped file 40->242 244 Creates an undocumented autostart registry key 40->244 246 Uses schtasks.exe or at.exe to add and modify task schedules 40->246 51 c53cfff621a84792162f70e790980e38.exe 40->51         started        54 setup.exe 40->54         started        57 toolspub2.exe 40->57         started        65 3 other processes 40->65 174 aapu.at 45->174 176 189.143.161.89, 50043, 80 UninetSAdeCVMX Mexico 45->176 180 6 other IPs or domains 45->180 136 C:\Users\user\AppData\Roaming\ssrcstu, PE32 45->136 dropped 138 C:\Users\user\AppData\Local\Temp8BD.exe, PE32 45->138 dropped 248 System process connects to network (likely due to code injection or exploit) 45->248 250 Benign windows process drops PE files 45->250 252 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->252 59 E8BD.exe 45->59         started        61 conhost.exe 47->61         started        63 conhost.exe 49->63         started        file13 254 Performs DNS TXT record lookups 174->254 signatures14 process15 dnsIp16 210 Multi AV Scanner detection for dropped file 51->210 212 Detected unpacking (changes PE section rights) 51->212 214 Detected unpacking (overwrites its own PE header) 51->214 220 2 other signatures 51->220 68 c53cfff621a84792162f70e790980e38.exe 51->68         started        72 powershell.exe 51->72         started        164 45.12.253.56, 80 CMCSUS Germany 54->164 74 WerFault.exe 54->74         started        84 6 other processes 54->84 216 Injects a PE file into a foreign processes 57->216 76 toolspub2.exe 57->76         started        166 us.imgjeoigaa.com 65->166 168 as.imgjeoigaa.com 65->168 122 C:\Users\...\05c92f6733dcc564944a756f582e1db5, SQLite 65->122 dropped 218 Tries to harvest and steal browser information (history, passwords, etc) 65->218 78 taskkill.exe 65->78         started        80 taskkill.exe 65->80         started        82 MpCmdRun.exe 65->82         started        86 8 other processes 65->86 file17 signatures18 process19 file20 124 C:\Windows\rss\csrss.exe, PE32 68->124 dropped 222 Drops executables to the windows directory (C:\Windows) and starts them 68->222 224 Creates an autostart registry key pointing to binary in C:\Windows 68->224 88 csrss.exe 68->88         started        93 cmd.exe 68->93         started        95 powershell.exe 68->95         started        105 2 other processes 68->105 97 conhost.exe 72->97         started        99 conhost.exe 78->99         started        101 conhost.exe 80->101         started        103 conhost.exe 82->103         started        signatures21 process22 dnsIp23 182 server10.cdneurops.shop 88->182 184 server10.cdneurops.shop 185.82.216.64, 443, 50097, 50118 ITL-BG Bulgaria 88->184 186 4 other IPs or domains 88->186 142 C:\Windows\windefender.exe, PE32 88->142 dropped 144 C:\Users\user\AppData\Local\...\injector.exe, PE32+ 88->144 dropped 146 C:\Users\...146tQuerySystemInformationHook.dll, PE32+ 88->146 dropped 148 5 other files (none is malicious) 88->148 dropped 256 Multi AV Scanner detection for dropped file 88->256 258 Detected unpacking (changes PE section rights) 88->258 260 Detected unpacking (overwrites its own PE header) 88->260 107 powershell.exe 88->107         started        262 Uses netsh to modify the Windows network and firewall settings 93->262 109 netsh.exe 93->109         started        112 conhost.exe 93->112         started        114 conhost.exe 95->114         started        116 conhost.exe 105->116         started        118 conhost.exe 105->118         started        file24 264 Uses STUN server to do NAT traversial 182->264 signatures25 process26 signatures27 120 conhost.exe 107->120         started        266 Creates files in the system32 config directory 109->266 process28
Threat name:
ByteCode-MSIL.Trojan.Zilla
Status:
Malicious
First seen:
2023-06-20 21:22:39 UTC
AV detection:
24 of 35 (68.57%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:fabookie family:gcleaner family:smokeloader botnet:pub5 botnet:up3 backdoor loader spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Amadey
Detect Fabookie payload
Fabookie
GCleaner
SmokeLoader
Malware Config
C2 Extraction:
45.9.74.80/0bjdn2Z/index.php
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
bb1aa29dca7c55add0bd5e53c735645b5cd0d5ab5105fd412026fa2c69e06191
MD5 hash:
55c8c7b199c0c7a793f0b24315ef88bb
SHA1 hash:
58729230e6520598c5b1e631ec58b25ab4253e9e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_DLInjector04
Author:ditekSHen
Description:Detects downloader / injector
Rule name:msil_rc4
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_gcleaner_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.gcleaner.
Rule name:win_gcleaner_de41
Author:Johannes Bader
Description:detects GCleaner
Rule name:win_gcleaner_w0
Author:Johannes Bader @viql
Description:detects GCleaner

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments