MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c78bc4870fa86cb7df8a0be4e18ed0019e08886422f4f304d5a85da00346c49b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: c78bc4870fa86cb7df8a0be4e18ed0019e08886422f4f304d5a85da00346c49b
SHA3-384 hash: df0c8d26b0bf2833b41097c3d2636e4298ac58c6d5ee2bbe6fff7e955445cae4a4181bfa3f4d244869be566513ab9aa4
SHA1 hash: 48288854aeacfb03b711be8654bbfedc5b3da5b3
MD5 hash: 7dad8df6ce3571f8be1461f0e1de10da
humanhash: kitten-alpha-hawaii-nevada
File name:7dad8df6ce3571f8be1461f0e1de10da.exe
Download: download sample
Signature Amadey
File size:161'792 bytes
First seen:2021-11-30 18:13:11 UTC
Last seen:2021-11-30 19:41:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3e8df926fd370bd9eed56bdb3961982f (5 x RedLineStealer, 2 x Amadey, 1 x CryptBot)
ssdeep 1536:KycSeZPJ6/p8bKxGZhecbP3zpnFHYIbJU6jV47SFisHl4rttaAQuk928XTOXLLN9:7cSeZhcOGIZUArbPV4Yick2AX8p2DQ2
Threatray 5'755 similar samples on MalwareBazaar
TLSH T1EEF39D1177E28471E1A356F068B48AA11A7BB8722131858F779C1E2E5FB33C04DB67D7
File icon (PE):PE icon
dhash icon fcfcd4d4d4d4d8c0 (75 x RedLineStealer, 56 x RaccoonStealer, 23 x Smoke Loader)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://185.215.113.35/d2VxjasuwS/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.215.113.35/d2VxjasuwS/index.php https://threatfox.abuse.ch/ioc/256420/

Intelligence


File Origin
# of uploads :
2
# of downloads :
289
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7dad8df6ce3571f8be1461f0e1de10da.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-30 18:17:31 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
DNS request
Searching for synchronization primitives
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Sending an HTTP POST request
Reading critical registry keys
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey Cryptbot Djvu RedLine SmokeLoader
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected Amadey bot
Yara detected Cryptbot
Yara detected Djvu Ransomware
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 531405 Sample: CYw9gmWr8C.exe Startdate: 30/11/2021 Architecture: WINDOWS Score: 100 108 unic7m.top 2->108 110 srtuiyhuali.at 2->110 128 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->128 130 Antivirus detection for URL or domain 2->130 132 Yara detected SmokeLoader 2->132 134 15 other signatures 2->134 12 CYw9gmWr8C.exe 2->12         started        14 jvtgjgb 2->14         started        17 bttgjgb 2->17         started        signatures3 process4 signatures5 19 CYw9gmWr8C.exe 12->19         started        160 Detected unpacking (changes PE section rights) 14->160 162 Machine Learning detection for dropped file 14->162 164 Maps a DLL or memory area into another process 14->164 168 2 other signatures 14->168 166 Injects a PE file into a foreign processes 17->166 22 bttgjgb 17->22         started        process6 signatures7 136 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 19->136 138 Maps a DLL or memory area into another process 19->138 140 Checks if the current machine is a virtual machine (disk enumeration) 19->140 142 Creates a thread in another existing process (thread injection) 19->142 24 explorer.exe 16 19->24 injected process8 dnsIp9 114 212.193.30.196, 49891, 7766 SPD-NETTR Russian Federation 24->114 116 srtuiyhuali.at 88.158.247.38, 49869, 49902, 80 SNR-RO Romania 24->116 118 10 other IPs or domains 24->118 96 C:\Users\user\AppData\Roaming\jvtgjgb, PE32 24->96 dropped 98 C:\Users\user\AppData\Roaming\bttgjgb, PE32 24->98 dropped 100 C:\Users\user\AppData\Local\Temp\DDD6.exe, PE32 24->100 dropped 102 11 other files (10 malicious) 24->102 dropped 152 System process connects to network (likely due to code injection or exploit) 24->152 154 Benign windows process drops PE files 24->154 156 Deletes itself after installation 24->156 158 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->158 29 8113.exe 4 24->29         started        33 7049.exe 24->33         started        35 16F6.exe 24->35         started        37 8 other processes 24->37 file10 signatures11 process12 dnsIp13 120 45.9.20.149, 42871, 49852 DEDIPATH-LLCUS Russian Federation 29->120 170 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 29->170 172 Query firmware table information (likely to detect VMs) 29->172 174 Tries to detect sandboxes and other dynamic analysis tools (window names) 29->174 188 3 other signatures 29->188 176 Machine Learning detection for dropped file 33->176 190 2 other signatures 33->190 40 7049.exe 33->40         started        178 Antivirus detection for dropped file 35->178 180 Multi AV Scanner detection for dropped file 35->180 192 2 other signatures 35->192 122 qoto.org 51.91.13.105, 443, 49908 OVHFR France 37->122 124 159.69.92.223, 49909, 80 HETZNER-ASDE Germany 37->124 126 file-file-host4.com 37->126 88 C:\Users\user\AppData\Local\...\32EB.exe.log, ASCII 37->88 dropped 90 C:\Users\user\AppData\...\mozglue[1].dll, PE32 37->90 dropped 92 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 37->92 dropped 94 5 other files (none is malicious) 37->94 dropped 182 Detected unpacking (changes PE section rights) 37->182 184 Detected unpacking (overwrites its own PE header) 37->184 186 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 37->186 194 5 other signatures 37->194 43 32EB.exe 37->43         started        46 cmd.exe 37->46         started        48 8CCC.exe 2 37->48         started        51 2 other processes 37->51 file14 signatures15 process16 dnsIp17 144 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 40->144 146 Maps a DLL or memory area into another process 40->146 148 Checks if the current machine is a virtual machine (disk enumeration) 40->148 150 Creates a thread in another existing process (thread injection) 40->150 53 8E1C.exe 40->53         started        104 C:\Users\user\AppData\Local\...\tkools.exe, PE32 43->104 dropped 56 cmd.exe 43->56         started        58 cmd.exe 43->58         started        60 cmd.exe 43->60         started        68 2 other processes 43->68 62 conhost.exe 46->62         started        64 timeout.exe 46->64         started        106 92.255.76.197, 38637, 49872 CONTINENTAL_GROUP-ASRU Russian Federation 48->106 66 conhost.exe 51->66         started        file18 signatures19 process20 dnsIp21 112 api.2ip.ua 77.123.139.190, 443, 49905 VOLIA-ASUA Ukraine 53->112 70 conhost.exe 56->70         started        72 cmd.exe 56->72         started        74 cacls.exe 56->74         started        76 conhost.exe 58->76         started        78 cmd.exe 58->78         started        80 cacls.exe 58->80         started        82 conhost.exe 60->82         started        84 cacls.exe 60->84         started        86 2 other processes 68->86 process22
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2021-11-30 18:14:12 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:arkei family:cryptbot family:icedid family:redline family:smokeloader botnet:default campaign:2904573523 backdoor banker discovery evasion infostealer spyware stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
Arkei Stealer Payload
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Arkei
CryptBot
IcedID, BokBot
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Win32/IcedID Request Cookie
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
Malware Config
C2 Extraction:
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://file-file-host4.com/tratata.php
92.255.76.197:38637
185.215.113.35/d2VxjasuwS/index.php
placingapie.ink
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe c78bc4870fa86cb7df8a0be4e18ed0019e08886422f4f304d5a85da00346c49b

(this sample)

  
Delivery method
Distributed via web download

Comments