MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ddb5ba02620ff537ab1fa4de5db434bd155fa3cc288d1a7e5c15422b493fdc81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 14


Intelligence 14 IOCs YARA 9 File information Comments

SHA256 hash: ddb5ba02620ff537ab1fa4de5db434bd155fa3cc288d1a7e5c15422b493fdc81
SHA3-384 hash: 8e8f17f30567aba2cd7795f34661ab473f0498e111501a1cffae6b3a8de494d2a82e9faf45146d550343fcb264de6293
SHA1 hash: 345cad1da7770bb7bfe1b65b45db893da84cb54c
MD5 hash: a538e695fcb3d17fad6eedd34dcd71e0
humanhash: magazine-pennsylvania-two-asparagus
File name:Setup.exe
Download: download sample
Signature Amadey
File size:5'307'904 bytes
First seen:2023-05-24 08:00:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 71dac11c80b80d1f1b6b3c60718d874a (2 x RedLineStealer, 2 x PrivateLoader, 1 x Amadey)
ssdeep 98304:laLpBjULTIRF1IoAbwvlcTFjsx6HMIOjzvmzmz41o:ULfYoRF1IjWWTNsUsIOjbrwo
Threatray 21 similar samples on MalwareBazaar
TLSH T13C36231179EF3849F439F5F64BCAC2B9565DF4D8E19F4A3B2294634B9BA06023F42870
TrID 52.9% (.EXE) Win32 Executable (generic) (4505/5/1)
23.5% (.EXE) Generic Win/DOS Executable (2002/3)
23.5% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 78f8cce6c6eb72b8 (2 x CoinMiner, 1 x RedLineStealer, 1 x Amadey)
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
83.97.73.122:19062

Intelligence


File Origin
# of uploads :
1
# of downloads :
265
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2023-05-24 08:03:30 UTC
Tags:
evasion privateloader opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Replacing files
Launching a service
DNS request
Launching a process
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Sending a UDP request
Creating a file
Forced system process termination
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Creating a window
Blocking the Windows Defender launch
Query of malicious DNS domain
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin packed packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Fabookie, Nymaim, PrivateLoader, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Fabookie
Yara detected Nymaim
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 874432 Sample: Setup.exe Startdate: 24/05/2023 Architecture: WINDOWS Score: 100 189 Malicious sample detected (through community Yara rule) 2->189 191 Antivirus detection for URL or domain 2->191 193 Antivirus detection for dropped file 2->193 195 15 other signatures 2->195 10 Setup.exe 10 40 2->10         started        15 PowerControl_Svc.exe 2->15         started        17 PowerControl_Svc.exe 2->17         started        19 5 other processes 2->19 process3 dnsIp4 179 188.114.96.7 CLOUDFLARENETUS European Union 10->179 181 87.240.132.78 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 10->181 185 12 other IPs or domains 10->185 131 C:\Users\...\ykhIombmHz7Wp1jknY2DpXav.exe, PE32 10->131 dropped 133 C:\Users\...\irbaYHOZAG0yy8Z5rHHRHUQX.exe, PE32 10->133 dropped 135 C:\Users\...\_tGfoT2JNMhifNrkjuQ4D6Na.exe, PE32+ 10->135 dropped 145 13 other malicious files 10->145 dropped 249 Detected unpacking (changes PE section rights) 10->249 251 Creates HTML files with .exe extension (expired dropper behavior) 10->251 253 Disables Windows Defender (deletes autostart) 10->253 257 3 other signatures 10->257 21 H8iteG_PGhJbsbvOmKjTOjxq.exe 10->21         started        24 UuX7FXjmtOgO3aMdW42Tvg9_.exe 17 10->24         started        27 QeSueGMtmaS_PcxkvXmnvpJk.exe 10->27         started        34 5 other processes 10->34 137 C:\Users\...\4k3j9RuPhVaq_yHxRtlhMOm1.exe, MS-DOS 15->137 dropped 139 C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS 15->139 dropped 30 4k3j9RuPhVaq_yHxRtlhMOm1.exe 15->30         started        141 C:\Users\...\obDn6J5DhGy7z3bukDQDHd4F.exe, MS-DOS 17->141 dropped 143 C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS 17->143 dropped 32 obDn6J5DhGy7z3bukDQDHd4F.exe 17->32         started        183 40.127.240.158 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->183 255 Query firmware table information (likely to detect VMs) 19->255 file5 signatures6 process7 dnsIp8 95 C:\Users\...\_b6J8h8vfCBZJteTG0i5cW3e.exe, MS-DOS 21->95 dropped 97 C:\Users\user\AppData\Local\...\WWW14[2].bmp, MS-DOS 21->97 dropped 99 C:\...\PowerControl_Svc.exe, PE32 21->99 dropped 36 _b6J8h8vfCBZJteTG0i5cW3e.exe 21->36         started        55 2 other processes 21->55 167 149.154.167.99 TELEGRAMRU United Kingdom 24->167 169 94.142.138.113 IHOR-ASRU Russian Federation 24->169 171 192.168.2.1 unknown unknown 24->171 101 C:\Users\...\hvrF_Mt40X1hIaQ8SOYavY6O.exe, MS-DOS 24->101 dropped 103 C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS 24->103 dropped 105 C:\...\PowerControl_Svc.exe, PE32 24->105 dropped 41 hvrF_Mt40X1hIaQ8SOYavY6O.exe 24->41         started        43 schtasks.exe 24->43         started        223 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 27->223 225 Maps a DLL or memory area into another process 27->225 243 2 other signatures 27->243 45 explorer.exe 27->45 injected 227 Multi AV Scanner detection for dropped file 30->227 229 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 30->229 231 Query firmware table information (likely to detect VMs) 30->231 245 4 other signatures 30->245 233 Tries to evade debugger and weak emulator (self modifying code) 32->233 235 Tries to detect virtualization through RDTSC time measurements 32->235 237 Hides threads from debuggers 32->237 173 185.81.68.115 KLNOPT-ASFI Finland 34->173 175 103.100.211.218 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 34->175 177 5 other IPs or domains 34->177 107 C:\Users\user\AppData\Local\...\is-9BCVU.tmp, PE32 34->107 dropped 109 C:\Users\user\AppData\Local\...\v3975467.exe, PE32 34->109 dropped 111 C:\Users\user\AppData\Local\...\d8098402.exe, PE32 34->111 dropped 239 Writes to foreign memory regions 34->239 241 Allocates memory in foreign processes 34->241 247 2 other signatures 34->247 47 v3975467.exe 34->47         started        49 is-9BCVU.tmp 34->49         started        51 AppLaunch.exe 34->51         started        53 conhost.exe 34->53         started        file9 signatures10 process11 dnsIp12 147 85.217.144.228 WS171-ASRU Bulgaria 36->147 155 4 other IPs or domains 36->155 113 C:\Users\...\ylqXhNRfBCODhoSl_RnzqqAs.exe, PE32 36->113 dropped 115 C:\Users\...\rwvIpNxoXiZ9UVdCjT5Elh6l.exe, PE32+ 36->115 dropped 121 11 other malicious files 36->121 dropped 197 Multi AV Scanner detection for dropped file 36->197 199 Detected unpacking (changes PE section rights) 36->199 201 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 36->201 221 5 other signatures 36->221 157 3 other IPs or domains 41->157 117 C:\Users\...\tPqul5Z1oQFxTOZu5EMHzfu5.exe, PE32 41->117 dropped 119 C:\Users\...\nJUFPkDDbY8vFeJUzFzhDH4Y.exe, PE32 41->119 dropped 123 11 other malicious files 41->123 dropped 203 Query firmware table information (likely to detect VMs) 41->203 205 Creates HTML files with .exe extension (expired dropper behavior) 41->205 207 Disables Windows Defender (deletes autostart) 41->207 57 conhost.exe 43->57         started        149 103.233.24.19 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 45->149 151 187.212.202.106 UninetSAdeCVMX Mexico 45->151 159 5 other IPs or domains 45->159 125 11 other malicious files 45->125 dropped 209 System process connects to network (likely due to code injection or exploit) 45->209 211 Benign windows process drops PE files 45->211 213 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->213 59 rundll32.exe 45->59         started        61 rundll32.exe 45->61         started        63 rundll32.exe 45->63         started        127 2 other malicious files 47->127 dropped 65 v1104218.exe 47->65         started        129 8 other files (7 malicious) 49->129 dropped 68 Rec524.exe 49->68         started        153 157.254.164.98 BEANFIELDCA United States 51->153 215 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 51->215 217 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 51->217 219 Tries to steal Crypto Currency Wallets 51->219 71 conhost.exe 55->71         started        73 conhost.exe 55->73         started        file13 signatures14 process15 dnsIp16 89 C:\Users\user\AppData\Local\...\b4836122.exe, PE32 65->89 dropped 91 C:\Users\user\AppData\Local\...\a4824473.exe, PE32 65->91 dropped 75 b4836122.exe 65->75         started        79 a4824473.exe 65->79         started        161 45.12.253.56 CMCSUS Germany 68->161 163 45.12.253.72 CMCSUS Germany 68->163 165 45.12.253.75 CMCSUS Germany 68->165 93 C:\Users\user\AppData\Roaming\...\z0gNA.exe, PE32 68->93 dropped 81 z0gNA.exe 68->81         started        83 cmd.exe 68->83         started        file17 process18 dnsIp19 187 83.97.73.122 UNACS-AS-BG8000BurgasBG Germany 75->187 259 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 75->259 261 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 75->261 263 Tries to harvest and steal browser information (history, passwords, etc) 75->263 265 Multi AV Scanner detection for dropped file 79->265 267 Disable Windows Defender notifications (registry) 79->267 85 conhost.exe 83->85         started        87 taskkill.exe 83->87         started        signatures20 process21
Threat name:
Win32.Trojan.PrivateLoader
Status:
Malicious
First seen:
2023-05-24 08:01:07 UTC
File Type:
PE (Exe)
Extracted files:
57
AV detection:
16 of 23 (69.57%)
Threat level:
  5/5
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader loader main spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
PrivateLoader
Malware Config
C2 Extraction:
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
45.15.156.229
85.208.136.10
94.131.106.196
5.181.80.133
94.142.138.131
94.142.138.113
208.67.104.60
Unpacked files
SH256 hash:
204bbd28241abf615e59c70a2981b3fc901d888de58e4a94e108f1c8e22e86c9
MD5 hash:
22c38559f9ec5b9935d35714b8ff1a97
SHA1 hash:
8d0ad15b977c58c9f05ff53bf8955f74dfed4e1e
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
ddb5ba02620ff537ab1fa4de5db434bd155fa3cc288d1a7e5c15422b493fdc81
MD5 hash:
a538e695fcb3d17fad6eedd34dcd71e0
SHA1 hash:
345cad1da7770bb7bfe1b65b45db893da84cb54c
Malware family:
PrivateLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:privateloader
Author:andretavare5
Description:PrivateLoader pay-per-install malware
Rule name:Privateloader_Main_Component
Description:Detects PrivateLoader Main Component
Rule name:TeslaCryptPackedMalware
Rule name:Windows_Trojan_PrivateLoader_96ac2734
Author:Elastic Security
Rule name:win_privateloader
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service
Rule name:win_privateloader_w0
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments