MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 18


Intelligence 18 IOCs YARA 9 File information Comments

SHA256 hash: efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989
SHA3-384 hash: f50609c779da23d671268ec1fb3ada1b7f32b9a6cb8d194342d8fe10cc2a02a481160ea974a98922cf417a2a1f09f1eb
SHA1 hash: af829594dc191d8dc5f0bcdde496d1b98130d754
MD5 hash: 41bfbce19932e1a75259a03ba23bdd33
humanhash: india-green-don-asparagus
File name:41bfbce19932e1a75259a03ba23bdd33.exe
Download: download sample
Signature Amadey
File size:2'146'304 bytes
First seen:2025-02-18 06:31:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:dOcb9F16Y7tPT0JCy0wzbtpFfUrSv/YVNNHAqo:koV7t70JCyCuv/uBo
TLSH T1F2A522B765A46C2FE0B340B430F541F3DC9ADB25C219251BB9DA90B5E2AF9D84C76E0C
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter abuse_ch
Tags:Amadey exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
504
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
aa883f75bff0257a0fefd5d8d20c6297.exe
Verdict:
Malicious activity
Analysis date:
2025-02-17 20:23:29 UTC
Tags:
auto amadey botnet stealer loader lumma themida telegram opendir python qrcode tofsee pythonstealer cryptbot pastebin arch-exec rat remcos generic gcleaner redline rdp lefthook stealc evasion credentialflusher autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
infosteal redline autorun spam
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for analyzing tools
Creating a file
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Connection attempt to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
crypt microsoft_visual_cc obfuscated packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Healer AV Disabler, LummaC Steal
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates HTA files
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Powershell drops PE file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1617690 Sample: hHtR1O06GH.exe Startdate: 18/02/2025 Architecture: WINDOWS Score: 100 119 lestagames.world 2->119 121 ecozessentials.com 2->121 123 27 other IPs or domains 2->123 159 Suricata IDS alerts for network traffic 2->159 161 Found malware configuration 2->161 163 Antivirus detection for URL or domain 2->163 165 25 other signatures 2->165 11 skotes.exe 2 56 2->11         started        16 hHtR1O06GH.exe 5 2->16         started        18 9db7f37142.exe 2->18         started        20 2 other processes 2->20 signatures3 process4 dnsIp5 137 185.215.113.16, 64693, 80 WHOLESALECONNECTIONSNL Portugal 11->137 139 185.215.113.43, 64635, 64636, 64640 WHOLESALECONNECTIONSNL Portugal 11->139 143 2 other IPs or domains 11->143 103 C:\Users\user\AppData\...\7b63166ddf.exe, PE32 11->103 dropped 105 C:\Users\user\AppData\Local\...\qFqSpAp.exe, PE32 11->105 dropped 107 C:\Users\user\AppData\Local\...\Bjkm5hE.exe, PE32 11->107 dropped 115 22 other malicious files 11->115 dropped 211 Creates multiple autostart registry keys 11->211 213 Hides threads from debuggers 11->213 215 Tries to detect sandboxes / dynamic malware analysis system (registry check) 11->215 217 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 11->217 22 9db7f37142.exe 11->22         started        26 jROrnzx.exe 11->26         started        28 Ta3ZyUR.exe 2 11->28         started        38 5 other processes 11->38 109 C:\Users\user\AppData\Local\...\skotes.exe, PE32 16->109 dropped 111 C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII 16->111 dropped 219 Detected unpacking (changes PE section rights) 16->219 221 Tries to evade debugger and weak emulator (self modifying code) 16->221 223 Tries to detect virtualization through RDTSC time measurements 16->223 30 skotes.exe 16->30         started        113 C:\Users\user\AppData\Local\...\qBrryFCFZ.hta, HTML 18->113 dropped 225 Binary is likely a compiled AutoIt script file 18->225 227 Creates HTA files 18->227 32 mshta.exe 18->32         started        34 cmd.exe 18->34         started        141 127.0.0.1 unknown unknown 20->141 229 Suspicious powershell command line found 20->229 231 Tries to download and execute files (via powershell) 20->231 36 powershell.exe 20->36         started        file6 signatures7 process8 dnsIp9 101 C:\Users\user\AppData\Local\...\UgD7WgJAg.hta, HTML 22->101 dropped 167 Binary is likely a compiled AutoIt script file 22->167 169 Creates HTA files 22->169 41 mshta.exe 22->41         started        44 cmd.exe 22->44         started        171 Multi AV Scanner detection for dropped file 26->171 173 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 26->173 175 Injects a PE file into a foreign processes 26->175 46 jROrnzx.exe 26->46         started        54 2 other processes 26->54 177 Contains functionality to inject code into remote processes 28->177 56 2 other processes 28->56 179 Detected unpacking (changes PE section rights) 30->179 189 5 other signatures 30->189 181 Suspicious powershell command line found 32->181 183 Tries to download and execute files (via powershell) 32->183 49 powershell.exe 32->49         started        58 2 other processes 34->58 52 conhost.exe 36->52         started        125 ecozessentials.com 91.202.233.244, 64668, 80 M247GB Russian Federation 38->125 127 blastikcn.com 104.21.60.59, 443, 64652, 64655 CLOUDFLARENETUS United States 38->127 185 Attempt to bypass Chrome Application-Bound Encryption 38->185 187 Query firmware table information (likely to detect VMs) 38->187 191 2 other signatures 38->191 60 10 other processes 38->60 file10 signatures11 process12 dnsIp13 193 Suspicious powershell command line found 41->193 195 Tries to download and execute files (via powershell) 41->195 62 powershell.exe 41->62         started        197 Uses schtasks.exe or at.exe to add and modify task schedules 44->197 66 conhost.exe 44->66         started        68 schtasks.exe 44->68         started        145 lestagames.world 188.114.96.3, 443, 64672, 64675 CLOUDFLARENETUS European Union 46->145 199 Query firmware table information (likely to detect VMs) 46->199 201 Tries to harvest and steal ftp login credentials 46->201 203 Tries to harvest and steal browser information (history, passwords, etc) 46->203 97 TempHLP0OZ88YBEHH5W0RICPGVIH3THMV5N1.EXE, PE32 49->97 dropped 70 conhost.exe 49->70         started        147 nestlecompany.world 172.67.150.155, 443, 64638, 64641 CLOUDFLARENETUS United States 56->147 205 Found many strings related to Crypto-Wallets (likely being stolen) 56->205 207 Tries to steal Crypto Currency Wallets 56->207 149 5.75.210.149, 443, 64681, 64684 HETZNER-ASDE Germany 60->149 99 C:\Temp\nRyLXHovP.hta, HTML 60->99 dropped 209 Creates HTA files 60->209 72 chrome.exe 60->72         started        75 cmd.exe 60->75         started        77 cmd.exe 60->77         started        79 4 other processes 60->79 file14 signatures15 process16 dnsIp17 117 TempJPCSKBXTSSNCCE8BLGIXIL4VZWJX18ZJ.EXE, PE32 62->117 dropped 233 Powershell drops PE file 62->233 81 TempJPCSKBXTSSNCCE8BLGIXIL4VZWJX18ZJ.EXE 62->81         started        84 conhost.exe 62->84         started        135 239.255.255.250 unknown Reserved 72->135 86 chrome.exe 72->86         started        89 powershell.exe 75->89         started        91 powershell.exe 77->91         started        93 powershell.exe 79->93         started        file18 signatures19 process20 dnsIp21 151 Detected unpacking (changes PE section rights) 81->151 153 Tries to detect sandboxes and other dynamic analysis tools (window names) 81->153 155 Modifies windows update settings 81->155 157 7 other signatures 81->157 129 www.google.com 142.250.184.196 GOOGLEUS United States 86->129 131 play.google.com 142.250.186.174 GOOGLEUS United States 86->131 133 2 other IPs or domains 86->133 95 Conhost.exe 86->95         started        signatures22 process23
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2025-02-17 23:03:20 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:healer family:lumma family:redline family:sectoprat family:stealc botnet:9c9aa5 botnet:cheat botnet:default bootkit credential_access defense_evasion discovery dropper evasion execution infostealer persistence pyinstaller rat spyware stealer trojan upx
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies system certificate store
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Detects Pyinstaller
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
AutoIT Executable
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Writes to the Master Boot Record (MBR)
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Executes dropped EXE
Identifies Wine through registry keys
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Windows security modification
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Uses browser remote debugging
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Amadey family
Detects Healer an antivirus disabler dropper
Healer
Healer family
Lumma Stealer, LummaC
Lumma family
Modifies Windows Defender DisableAntiSpyware settings
Modifies Windows Defender Real-time Protection settings
Modifies Windows Defender TamperProtection settings
Modifies Windows Defender notification settings
RedLine
Redline family
SectopRAT
SectopRAT payload
Sectoprat family
Stealc
Stealc family
Malware Config
C2 Extraction:
http://185.215.113.43
103.84.89.222:33791
http://ecozessentials.com
https://mercharena.biz/api
Dropper Extraction:
http://185.215.113.16/defend/random.exe
http://185.215.113.16/mine/random.exe
Unpacked files
SH256 hash:
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989
MD5 hash:
41bfbce19932e1a75259a03ba23bdd33
SHA1 hash:
af829594dc191d8dc5f0bcdde496d1b98130d754
SH256 hash:
91d1a2453f9e854f0d54d4da50bab140a8e6ff89973a716c8c246e89df49ed2d
MD5 hash:
c7d9cfdc2036b44dff0c326d9d7ea351
SHA1 hash:
3fe1de07b8a4a2d7878ab7cc2483ec7360c214d4
Detections:
Amadey win_amadey
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly
Description:Amadey Payload
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Generic_Threat_1f2e969c
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments