MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e677a9da84b5b1a612abb286c046b17dd32f1dda2892a16a82e6ef4605156a12. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 19


Intelligence 19 IOCs YARA 35 File information Comments

SHA256 hash: e677a9da84b5b1a612abb286c046b17dd32f1dda2892a16a82e6ef4605156a12
SHA3-384 hash: 3304515cad13009b79e1ff801bf4c10cd35b10b2b1f5f1f1e0fae8886729d6120c2a4d945f7fe74d9fd3823310454050
SHA1 hash: 22fd3f8cbfae785650670ecf5b7de8f973c9c1b3
MD5 hash: a8983bbf9737642d5ec6470ed6c9067d
humanhash: shade-sink-florida-orange
File name:ProxyLeecherbyAlphacrack_.exe
Download: download sample
Signature Amadey
File size:16'908'288 bytes
First seen:2025-05-29 14:06:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 223f8057932cb61043b0989210626737 (6 x Amadey, 4 x SVCStealer, 4 x RedLineStealer)
ssdeep 393216:MHDiN8DWiXLYEdYHi9WJdoyMxtDDAx5w5EpELVHWI3DA:Q1WiX0gYHY+doy2AHpEtWI
TLSH T19C0702292D6490B8E1578478A1550DBADB317C1B0B61B5EB05A8E23F3FB77F11A3E720
TrID 65.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.4% (.EXE) Win64 Executable (generic) (10522/11/4)
8.9% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.0% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 10d4e8f06970b210 (1 x Amadey)
Reporter aachum
Tags:Amadey b8c4ef exe


Avatar
iamaachum
Amadey Botnet: b8c4ef
Amadey C2: http://185.156.72.8/rob75u9v/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
479
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
ProxyLeecherbyAlphacrack_.exe
Verdict:
Malicious activity
Analysis date:
2025-05-23 20:51:57 UTC
Tags:
amadey botnet stealer diamotrix clipper auto-reg python loader crypto-regex arch-doc rust rdp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
redline autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %AppData% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Creating a window
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a file
Creating a process with a hidden window
Searching for synchronization primitives
Moving a file to the %AppData% subdirectory
Launching a process
Using the Windows Management Instrumentation requests
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Enabling a "Do not show hidden files" option
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Forced shutdown of a browser
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm barys base64 clipbanker cmd expand fingerprint fingerprint lolbin microsoft_visual_cc netsh packed packed packer_detected redline wmic
Result
Threat name:
Amadey, MicroClip, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes the view of files in windows explorer (hidden files and folders)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Detected generic credential text file
Drops executables to the windows directory (C:\Windows) and starts them
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Sigma detected: Powershell launch regsvr32
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected MicroClip
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1701558 Sample: ProxyLeecherbyAlphacrack_.exe Startdate: 29/05/2025 Architecture: WINDOWS Score: 100 188 Suricata IDS alerts for network traffic 2->188 190 Found malware configuration 2->190 192 Malicious sample detected (through community Yara rule) 2->192 194 15 other signatures 2->194 14 ProxyLeecherbyAlphacrack_.exe 8 2->14         started        17 nudwee.exe 2->17         started        20 winapp.exe 2->20         started        22 3 other processes 2->22 process3 file4 174 C:\Users\user\Desktop\Launcher.exe, PE32 14->174 dropped 176 C:\Users\user\AppData\Roaming\wxcvxverd.exe, PE32+ 14->176 dropped 178 C:\Users\user\AppData\Roaming\gfgdfxwx.exe, PE32+ 14->178 dropped 180 4 other malicious files 14->180 dropped 24 cvcxxxx.exe 95 14->24         started        29 cxvezrfde.exe 52 14->29         started        31 bvcbghgf.exe 2 14->31         started        33 4 other processes 14->33 186 Contains functionality to start a terminal service 17->186 signatures5 process6 dnsIp7 182 185.156.72.8, 49723, 49724, 49725 ITDELUXE-ASRU Russian Federation 24->182 144 C:\Users\user\AppData\Local\...\temp_1280.exe, PE32+ 24->144 dropped 146 C:\Users\user\AppData\Local\...\temp_1260.exe, PE32+ 24->146 dropped 148 C:\Users\user\AppData\Local\...\temp_1250.exe, PE32+ 24->148 dropped 158 10 other malicious files 24->158 dropped 214 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 24->214 216 Tries to steal Crypto Currency Wallets 24->216 218 Detected generic credential text file 24->218 35 temp_1260.exe 24->35         started        38 temp_1244.exe 24->38         started        40 temp_1241.exe 24->40         started        49 3 other processes 24->49 150 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 29->150 dropped 160 49 other malicious files 29->160 dropped 43 cxvezrfde.exe 29->43         started        152 C:\Users\user\AppData\Local\...\bvcbghgf.tmp, PE32 31->152 dropped 45 bvcbghgf.tmp 3 5 31->45         started        184 62.60.226.191, 1912, 49722, 49732 ASLINE-AS-APASLINELIMITEDHK Iran (ISLAMIC Republic Of) 33->184 154 C:\Users\user\AppData\Roaming\...\winapp.exe, PE32+ 33->154 dropped 156 C:\Users\user\AppData\Local\...\nudwee.exe, PE32 33->156 dropped 220 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 33->220 222 Contains functionality to start a terminal service 33->222 224 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 33->224 226 3 other signatures 33->226 47 nudwee.exe 33->47         started        file8 signatures9 process10 file11 114 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 35->114 dropped 130 49 other malicious files 35->130 dropped 51 temp_1260.exe 35->51         started        116 C:\Users\user\AppData\Local\...\temp_1244.tmp, PE32 38->116 dropped 53 temp_1244.tmp 38->53         started        118 C:\Windows\sysrtlcw.exe, PE32+ 40->118 dropped 120 C:\Windows\System32\sysmanger.exe, PE32+ 40->120 dropped 122 C:\Users\user\AppData\...\sysmrdrv.exe, PE32+ 40->122 dropped 196 Creates multiple autostart registry keys 40->196 198 Creates an autostart registry key pointing to binary in C:\Windows 40->198 200 Found direct / indirect Syscall (likely to bypass EDR) 40->200 56 sysmanger.exe 40->56         started        124 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 45->124 dropped 126 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 45->126 dropped 59 bvcbghgf.exe 2 45->59         started        202 Multi AV Scanner detection for dropped file 47->202 204 Contains functionality to start a terminal service 47->204 128 C:\ProgramData\...\System_Info.txt, data 49->128 dropped 206 Tries to harvest and steal browser information (history, passwords, etc) 49->206 208 Tries to steal Crypto Currency Wallets 49->208 210 Detected generic credential text file 49->210 signatures12 process13 file14 140 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 53->140 dropped 61 temp_1244.exe 53->61         started        212 Found direct / indirect Syscall (likely to bypass EDR) 56->212 142 C:\Users\user\AppData\Local\...\bvcbghgf.tmp, PE32 59->142 dropped 64 bvcbghgf.tmp 59->64         started        signatures15 process16 file17 164 C:\Users\user\AppData\Local\...\temp_1244.tmp, PE32 61->164 dropped 66 temp_1244.tmp 61->66         started        166 C:\...\PackageSupportFramework_7.pfx (copy), PE32+ 64->166 dropped 168 C:\Users\user\AppData\...\is-3OEAF.tmp, PE32+ 64->168 dropped 170 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 64->170 dropped 172 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 64->172 dropped 69 regsvr32.exe 64->69         started        process18 file19 108 C:\Users\user\AppData\Local\...\is-51D7E.tmp, PE32+ 66->108 dropped 110 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 66->110 dropped 112 C:\Users\user\AppData\Local\...\7z.exe (copy), PE32+ 66->112 dropped 71 regsvr32.exe 66->71         started        73 7z.exe 66->73         started        76 regsvr32.exe 69->76         started        process20 file21 79 regsvr32.exe 71->79         started        162 C:\Users\user\...\AppHostInterface_1.drv, PE32+ 73->162 dropped 82 conhost.exe 73->82         started        230 Suspicious powershell command line found 76->230 232 Injects code into the Windows Explorer (explorer.exe) 76->232 234 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 76->234 236 4 other signatures 76->236 84 explorer.exe 76->84 injected 87 powershell.exe 76->87         started        89 powershell.exe 76->89         started        signatures22 process23 file24 238 Suspicious powershell command line found 79->238 91 powershell.exe 79->91         started        94 powershell.exe 79->94         started        132 C:\Users\user\AppData\Local\...\F904.tmp.exe, PE32+ 84->132 dropped 134 C:\Users\user\AppData\Local\...74.tmp.exe, PE32+ 84->134 dropped 136 C:\Users\user\AppData\Local\...\BEFB.tmp.exe, PE32+ 84->136 dropped 138 2 other malicious files 84->138 dropped 240 System process connects to network (likely due to code injection or exploit) 84->240 242 Benign windows process drops PE files 84->242 244 Drops executables to the windows directory (C:\Windows) and starts them 84->244 96 sysmanger.exe 84->96         started        98 sysrtlcw.exe 84->98         started        100 sysmrdrv.exe 84->100         started        246 Loading BitLocker PowerShell Module 87->246 102 conhost.exe 87->102         started        104 conhost.exe 89->104         started        signatures25 process26 signatures27 228 Loading BitLocker PowerShell Module 91->228 106 conhost.exe 91->106         started        process28
Threat name:
Win64.Ransomware.RedLine
Status:
Malicious
First seen:
2025-05-22 02:26:03 UTC
File Type:
PE+ (Exe)
Extracted files:
74
AV detection:
26 of 36 (72.22%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
svcstealer
Score:
  10/10
Tags:
family:amadey family:redline family:svcstealer botnet:b8c4ef botnet:ppvv discovery downloader execution infostealer persistence pyinstaller spyware stealer trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Detects Pyinstaller
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Command and Scripting Interpreter: PowerShell
Drops file in System32 directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Amadey
Amadey family
Detects SvcStealer Payload
RedLine
RedLine payload
Redline family
SvcStealer, Diamotrix
Svcstealer family
Malware Config
C2 Extraction:
http://185.156.72.8
176.113.115.149
185.81.68.156
62.60.226.191:1912
Verdict:
Malicious
Tags:
Win.Dropper.Malaz-9939293-0
YARA:
n/a
Unpacked files
SH256 hash:
e677a9da84b5b1a612abb286c046b17dd32f1dda2892a16a82e6ef4605156a12
MD5 hash:
a8983bbf9737642d5ec6470ed6c9067d
SHA1 hash:
22fd3f8cbfae785650670ecf5b7de8f973c9c1b3
Detections:
Amadey
SH256 hash:
a3e2c415e6fcde6efedfef34d23f8ea1385377c1f3d1d13766cbd14107207f26
MD5 hash:
995ecabb3c3e584b62f1e46eaad54c8d
SHA1 hash:
9628cd47f7ee6dce492f60efb24c180a8ee332d9
SH256 hash:
631491fd39ec560d77b9c0bf55c1fb8c144e2b7effd25fe52342ed99c052d4ee
MD5 hash:
7c85687956e00bdbbf28d98a44780bb5
SHA1 hash:
823f5554fe0ae97456d990b2627316298be075c5
SH256 hash:
769780ce6944f15a082b75d4b6c0ba08f42c1620daae91d06e89c71ac70bd9e8
MD5 hash:
41742674291e4e4a3e177c742a65dde8
SHA1 hash:
200ad9154997bfa8370bf00677a78e61eefee8f2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:cobalt_strike_beacon_detected
Author:0x0d4y
Description:This rule detects cobalt strike beacons.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:detect_Redline_Stealer_V2
Author:Varp0s
Rule name:GenericRedLineLike
Author:Still
Description:Matches RedLine-like stealer; may match its variants.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:MALWARE_Win_MetaStealer
Author:ditekSHen
Description:Detects MetaStealer infostealer
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:RedLine_Stealer_unpacked_PulseIntel
Author:PulseIntel
Description:Detecting unpacked Redline
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:svc_stealer
Author:Nikolaos 'n0t' Totosis
Description:SVC Stealer Payload
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:Windows_Generic_Threat_efdb9e81
Author:Elastic Security
Rule name:Windows_Trojan_Generic_40899c85
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_6dfafd7b
Author:Elastic Security
Rule name:win_redline_stealer_generic
Author:dubfib

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe e677a9da84b5b1a612abb286c046b17dd32f1dda2892a16a82e6ef4605156a12

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW

Comments