MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d17fbdccb55a602246b26034b6ce9d64ae1c3b5ad48fd93a732d2fb1dd8de6df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 21


Intelligence 21 IOCs 2 YARA 15 File information Comments

SHA256 hash: d17fbdccb55a602246b26034b6ce9d64ae1c3b5ad48fd93a732d2fb1dd8de6df
SHA3-384 hash: a5d736d6c5e44c94d57434bb46d0e72d4b4e9c3751512ab2176181f85f84bf0fe45f96929a4033abe21492d90cb1a9c7
SHA1 hash: 50c1dcc9ce623fa5c989a61835845b5a8865148b
MD5 hash: 91038e60e0d3fddbc279c2b9b7311a09
humanhash: king-carolina-johnny-oven
File name:random.exe
Download: download sample
Signature Amadey
File size:5'097'472 bytes
First seen:2025-09-19 00:20:21 UTC
Last seen:2025-09-19 09:05:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 98304:2hOgF5I1CF/b6z1lGHDupYFATrm99852kr6WuBea1c/nY/G:2h35IoQZEcYFKe985prJG1cv
TLSH T1E23633A616AEC190FF3B2AB855177E1B384C81F1A4A7F25082CD112B4F1634E6793B5F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
2.58.56.17:7705

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
2.58.56.17:7705 https://threatfox.abuse.ch/ioc/1593901/
http://178.16.54.200/f8nus4b/index.php https://threatfox.abuse.ch/ioc/1593931/

Intelligence


File Origin
# of uploads :
2
# of downloads :
170
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-09-19 00:02:52 UTC
Tags:
lumma stealer amadey botnet unlocker-eject tool themida arch-exec rdp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect phishing
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
amadey cmd lolbin obfuscated packed reconnaissance sc schtasks unsafe zusy
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-18T21:10:00Z UTC
Last seen:
2025-09-18T21:10:00Z UTC
Hits:
~10
Detections:
Trojan.Agentb.TCP.C&C Trojan-Downloader.Win32.Deyma.sb HEUR:Trojan-PSW.Win32.Lumma.pef HEUR:Trojan-Downloader.Win32.Deyma.gen HEUR:Trojan-Downloader.MSIL.Deyma.gen HEUR:Trojan.Win32.Generic Trojan-PSW.Lumma.HTTP.Download Trojan.Nymaim.HTTP.ServerRequest Trojan.BAT.Agent.cot PDM:Trojan.Win32.Generic
Result
Threat name:
LummaC Stealer, Vidar
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Drops executables to the windows directory (C:\Windows) and starts them
Drops password protected ZIP file
Found malware configuration
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: PUA - NSudo Execution
Sigma detected: Suspicious New Service Creation
Suricata IDS alerts for network traffic
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the nircmd tool (NirSoft)
Yara detected LummaC Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1780432 Sample: random.exe Startdate: 19/09/2025 Architecture: WINDOWS Score: 100 95 chrome1update.shop 2->95 97 acrislegt.su 2->97 105 Suricata IDS alerts for network traffic 2->105 107 Found malware configuration 2->107 109 Antivirus detection for URL or domain 2->109 111 14 other signatures 2->111 10 random.exe 9 2->10         started        14 random.exe 4 2->14         started        16 svchosthelper.exe 2->16         started        18 6 other processes 2->18 signatures3 process4 dnsIp5 83 C:\Windows\systemhelper.exe, PE32 10->83 dropped 85 C:\Windows\svchosthelper.exe, PE32 10->85 dropped 87 C:\Users\user\AppData\...\svchostmanager.exe, PE32 10->87 dropped 93 3 other malicious files 10->93 dropped 127 Drops executables to the windows directory (C:\Windows) and starts them 10->127 21 svchosthelper.exe 1 61 10->21         started        26 systemhelper.exe 15 10->26         started        28 cmd.exe 1 10->28         started        36 2 other processes 10->36 89 C:\Windows\Temp\svchostmanager.exe, PE32 14->89 dropped 91 C:\Windows\Temp\svchostam.exe, PE32 14->91 dropped 129 Contains functionality to start a terminal service 14->129 131 Uses cmd line tools excessively to alter registry or file data 14->131 30 svchosthelper.exe 14->30         started        32 Conhost.exe 14->32         started        99 127.0.0.1 unknown unknown 18->99 34 WerFault.exe 18->34         started        file6 signatures7 process8 dnsIp9 101 178.16.54.200, 49713, 49720, 49722 DUSNET-ASDE Germany 21->101 103 178.16.55.70 DUSNET-ASDE Germany 21->103 67 C:\Users\user\AppData\Local\...\S8nPHvo.exe, PE32+ 21->67 dropped 69 C:\Users\user\AppData\Local\...\YqShJwS.exe, PE32+ 21->69 dropped 71 C:\Users\user\AppData\Local\...\JLX80Su.exe, PE32 21->71 dropped 79 29 other malicious files 21->79 dropped 115 Contains functionality to start a terminal service 21->115 117 Uses cmd line tools excessively to alter registry or file data 21->117 73 C:\Users\user\AppData\Local\...\nircmd.exe, PE32+ 26->73 dropped 75 C:\Users\user\AppData\Local\...\cecho.exe, PE32 26->75 dropped 77 C:\Users\user\AppData\Local\...77SudoLG.exe, PE32+ 26->77 dropped 81 2 other malicious files 26->81 dropped 38 cmd.exe 26->38         started        119 Uses schtasks.exe or at.exe to add and modify task schedules 28->119 121 Uses the nircmd tool (NirSoft) 28->121 41 conhost.exe 28->41         started        43 schtasks.exe 1 28->43         started        123 Multi AV Scanner detection for dropped file 30->123 125 Contains functionality to inject code into remote processes 30->125 45 WerFault.exe 30->45         started        47 conhost.exe 36->47         started        49 conhost.exe 36->49         started        file10 signatures11 process12 signatures13 113 Uses cmd line tools excessively to alter registry or file data 38->113 51 cmd.exe 38->51         started        53 find.exe 38->53         started        55 conhost.exe 38->55         started        59 22 other processes 38->59 57 Conhost.exe 47->57         started        process14 process15 61 tasklist.exe 51->61         started        63 Conhost.exe 51->63         started        65 Conhost.exe 53->65         started       
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.35 Win 32 Exe x86
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2025-09-19 00:02:53 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
admintool_nircmd unc_loader_051 amadey
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:lumma family:xmrig credential_access defense_evasion discovery execution miner persistence spyware stealer themida trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry key
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Launches sc.exe
Enumerates processes with tasklist
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Obfuscated Files or Information: Command Obfuscation
Power Settings
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Creates new service(s)
Downloads MZ/PE file
Sets service image path in registry
Stops running service(s)
Uses browser remote debugging
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner payload
Disables service(s)
Lumma Stealer, LummaC
Lumma family
Xmrig family
xmrig
Malware Config
C2 Extraction:
https://consnbx.su/sawo
https://yunded.com/uwuz
https://sirhirssg.su/xzde
https://prebwle.su/xazd
https://rhussois.su/tatr
https://todoexy.su/xqts
https://acrislegt.su/tazd
https://averiryvx.su/zadr
https://cerasatvf.su/qtpd
Unpacked files
SH256 hash:
d17fbdccb55a602246b26034b6ce9d64ae1c3b5ad48fd93a732d2fb1dd8de6df
MD5 hash:
91038e60e0d3fddbc279c2b9b7311a09
SHA1 hash:
50c1dcc9ce623fa5c989a61835845b5a8865148b
SH256 hash:
35f64bb0b91e09c2ed31dd58df9b1f1820cf317a263c63af6dee20c42d498464
MD5 hash:
c36e982177bcff2286a0cfc72f332ca4
SHA1 hash:
573c19b2a630adf1254cd6faa49b5bc9a55f79c5
SH256 hash:
3722a6129c5f703d00a8381d9955432ea8914d8c8fb8b4ee4febe82617d08f4d
MD5 hash:
3d550c211cb1ce0a39863f919b11efb0
SHA1 hash:
6345559018881ce22dff6806752512187d78d5a6
Detections:
Amadey
SH256 hash:
86bcd34ee88ed70434bf77b8cd6469a2693bbf89f60fe6dbef5eb4489ecff5c1
MD5 hash:
eaa3c54defa631170b7f1934f9ef5752
SHA1 hash:
e5830587c3492eeefa6bc098eca48b936811ab7c
SH256 hash:
c39c4466f622b7320076076ea3eb13fa0f784b9b097dff46d802f905fc39d851
MD5 hash:
a7993e5a520b17fec65435fb4838a08f
SHA1 hash:
18fe6286473a03735e7b701d4bfaf61ad35da7ad
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:TH_Generic_MassHunt_Webshells_2025_CYFARE
Author:CYFARE
Description:Generic multi-language webshell mass-hunt rule (PHP/ASP(X)/JSP/Python/Perl/Node) - 2025
Reference:https://cyfare.net/
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:win_lumma_generic
Author:dubfib

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments