MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f1c82464b7e4cba6736b09b7d945d4e22571e1dfe4439c579f28ba2b3d58ecdb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 17


Intelligence 17 IOCs YARA 8 File information Comments

SHA256 hash: f1c82464b7e4cba6736b09b7d945d4e22571e1dfe4439c579f28ba2b3d58ecdb
SHA3-384 hash: 83e4bc0198bc19d616f8703e137f57d08c5ea64d8fc13176a2b85c9235d9fb37cdbd327c6eafec66d9cfcb74cd80f2fa
SHA1 hash: 52c5042bc21bee394578171a54a917dc8e661eeb
MD5 hash: 7c36c9c998dcc8541c298390f94c107f
humanhash: five-aspen-apart-lactose
File name:file
Download: download sample
Signature Amadey
File size:844'288 bytes
First seen:2023-06-09 08:23:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:5yosStVGV1IbcilvludRR+6qaiFCqOU3wd:s07GPIwCudR4Rbw
TLSH T157051222BBE5C533D9B9177098FA03C30B367DA04974936B3B969C9A1D71BD4A13132E
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter andretavare5
Tags:Amadey exe


Avatar
andretavare5
Sample downloaded from http://83.97.73.130/gallery/photo250.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
265
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-06-09 08:24:37 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack.dll anti-vm CAB greyware installer lolbin packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 884803 Sample: file.exe Startdate: 09/06/2023 Architecture: WINDOWS Score: 100 82 Snort IDS alert for network traffic 2->82 84 Found malware configuration 2->84 86 Malicious sample detected (through community Yara rule) 2->86 88 14 other signatures 2->88 10 file.exe 1 4 2->10         started        13 rundll32.exe 2->13         started        15 rundll32.exe 2->15         started        17 rundll32.exe 2->17         started        process3 file4 60 C:\Users\user\AppData\Local\...\v3506463.exe, PE32 10->60 dropped 62 C:\Users\user\AppData\Local\...\e8881168.exe, PE32 10->62 dropped 19 v3506463.exe 1 4 10->19         started        process5 file6 52 C:\Users\user\AppData\Local\...\v9619366.exe, PE32 19->52 dropped 54 C:\Users\user\AppData\Local\...\d9462278.exe, PE32 19->54 dropped 90 Antivirus detection for dropped file 19->90 92 Multi AV Scanner detection for dropped file 19->92 94 Machine Learning detection for dropped file 19->94 23 v9619366.exe 1 4 19->23         started        signatures7 process8 file9 56 C:\Users\user\AppData\Local\...\v6140989.exe, PE32 23->56 dropped 58 C:\Users\user\AppData\Local\...\c3721658.exe, PE32 23->58 dropped 106 Antivirus detection for dropped file 23->106 108 Multi AV Scanner detection for dropped file 23->108 110 Machine Learning detection for dropped file 23->110 27 v6140989.exe 1 4 23->27         started        31 c3721658.exe 23->31         started        signatures10 process11 file12 64 C:\Users\user\AppData\Local\...\b1463008.exe, PE32 27->64 dropped 66 C:\Users\user\AppData\Local\...\a3335153.exe, PE32 27->66 dropped 112 Antivirus detection for dropped file 27->112 114 Multi AV Scanner detection for dropped file 27->114 116 Machine Learning detection for dropped file 27->116 33 a3335153.exe 1 27->33         started        36 b1463008.exe 1 27->36         started        118 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->118 120 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 31->120 122 Tries to harvest and steal browser information (history, passwords, etc) 31->122 124 Tries to steal Crypto Currency Wallets 31->124 signatures13 process14 signatures15 70 Antivirus detection for dropped file 33->70 72 Multi AV Scanner detection for dropped file 33->72 74 Machine Learning detection for dropped file 33->74 38 AppLaunch.exe 3 33->38         started        42 WerFault.exe 24 9 33->42         started        44 conhost.exe 33->44         started        76 Writes to foreign memory regions 36->76 78 Allocates memory in foreign processes 36->78 80 Injects a PE file into a foreign processes 36->80 46 AppLaunch.exe 9 1 36->46         started        48 conhost.exe 36->48         started        50 WerFault.exe 36->50         started        process16 dnsIp17 68 83.97.73.129, 19068, 49707, 49708 UNACS-AS-BG8000BurgasBG Germany 38->68 96 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 38->96 98 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 38->98 100 Tries to steal Crypto Currency Wallets 38->100 102 Disable Windows Defender notifications (registry) 46->102 104 Disable Windows Defender real time protection (registry) 46->104 signatures18
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2023-06-09 08:24:05 UTC
File Type:
PE (Exe)
Extracted files:
152
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:crazy botnet:muha discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Amadey
Modifies Windows Defender Real-time Protection settings
RedLine
Malware Config
C2 Extraction:
83.97.73.129:19068
77.91.68.30/music/rock/index.php
Unpacked files
SH256 hash:
1179db56d9eeb075848fc28c579769fd3f2019e3cfd1db1790b78ae988af5476
MD5 hash:
0cb2e681f928c1348e6f206c12364742
SHA1 hash:
ba7ee81a15dcd23ee386d94f3a8dd6fba87d99af
SH256 hash:
78db6aabb15be2bf71f3d159fc580aa6978d3949ce46518a58dc6268bb41fe98
MD5 hash:
3538ebd5c4280cd13236c104a32b752c
SHA1 hash:
3b073ef68f9a93264c6b60debab144587010f628
SH256 hash:
536a596671cce533031e712a4add5f6667f6da8d27ec59c3bd6eb1914978ff0d
MD5 hash:
5e1c8362da029c3f5dbfc45a3857c744
SHA1 hash:
52612c519c45d84e53670da7d13395b7a7b22846
Detections:
redline
SH256 hash:
8d246f5458d28d4998b0be4570dd3bed94b3bab7be4052263df62993e20ea0de
MD5 hash:
98eeb40b3c03fa19613d97d626a3e88f
SHA1 hash:
3292d436aa11834047399aa926e7a7bcf36e4be3
Detections:
Amadey
SH256 hash:
c740d12f8da4104ce6d9e307f477f08062c74676ef445e85078692245e895df2
MD5 hash:
d945dbb6d411f38f792eb87a9df0865b
SHA1 hash:
faecdb19a4cc7392d646125e8bc621a8142eba5b
SH256 hash:
09084515fa58becda5ee1b2c396ed569b3ae04a14fa11cf404b7317e2ba5b589
MD5 hash:
3ac817fed9a11e4189a3b83547326a7b
SHA1 hash:
47757892fd5bb284a40ee857147bf258ede6de1d
Detections:
HealerAVKiller
Parent samples :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 hash:
773884027fe834cb5c3bb0d30bb0c0ca3dac6f8a04f805dd200de837c937fc6e
MD5 hash:
83819cb8540c4c70978c9d6c68e64555
SHA1 hash:
e898b907301ffa8c17f271c2f9148bfd242b50b6
Detections:
redline
SH256 hash:
f1c82464b7e4cba6736b09b7d945d4e22571e1dfe4439c579f28ba2b3d58ecdb
MD5 hash:
7c36c9c998dcc8541c298390f94c107f
SHA1 hash:
52c5042bc21bee394578171a54a917dc8e661eeb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments