BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Amadey

22
Global rank
15 infographic chevron month
Month rank
10 infographic chevron week
Week rank
2474
IOCs

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Infostealer
Type
Likely ex-USSR
Origin
13 October, 2018
First seen
21 May, 2024
Last seen
Also known as
Amadey Bot

How to analyze Amadey with ANY.RUN

Infostealer
Type
Likely ex-USSR
Origin
13 October, 2018
First seen
21 May, 2024
Last seen

IOCs

IP addresses
147.45.47.126
5.42.96.7
5.42.96.141
185.172.128.19
185.215.113.67
185.172.128.33
193.233.132.167
185.172.128.3
185.172.128.5
193.3.19.154
185.172.128.61
185.172.128.61
185.172.128.61
185.172.128.61
94.156.68.141
5.42.96.141
77.91.68.3
193.233.132.56
193.233.132.139
5.42.65.125
Hashes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theclientisalwaysright.com
responsibilitybridge.com
findthebestopportunityforyou.com
topgamecheats.dev
bestfitnessgymintheworld.com
kindofwelcomeperspective.com
greatnessappreviews.com
greatnessappreviews.com
mail.officeemailbackup.com
c-cdns.top
ruspyc.top
atillapro.com
bestofthebesttraining.com
applereports.ddns.net
mail.acestar.com.ph
mail.telefoonreparatiebovenkarspel.nl
mail.zoomfilms-cz.com
smgqnt3eixxksasu.xyz
heso-vpn.ug
redteamminepool.ug
URLs
http://5.42.96.7/zamo7h/index.php
http://5.42.96.141/go34ko8/index.php
http://185.172.128.19/ghsdh39s/index.php
http://theclientisalwaysright.com/8BvxwQdec3/index.php
http://5.42.96.7/cost/lenin.exe
http://5.42.96.7/cost/go.exe
http://5.42.96.7/mine/amers.exe
http://5.42.96.7/lend/Scanner.exe
http://5.42.96.7/lend/lumma1.exe
http://5.42.96.7/lend/swizzhis.exe
http://5.42.96.7/lend/alex.exe
http://5.42.96.7/cost/sarra.exe
http://5.42.96.7/lend/Windows.exe
http://5.42.96.7/lend/taskmgr.exe
http://5.42.96.7/cost/installer.exe
http://5.42.96.7/lend/Kaxhwswfup.exe
http://5.42.96.7/lend/crypted333.exe
http://5.42.96.7/lend/WinSec.exe
http://5.42.96.7/lend/swizzzz.exe
http://5.42.96.7/lend/swizzz.exe
Last Seen at

Recent blog posts

post image
Windows 11 UAC Bypass in Modern Malware
watchers 31
comments 0
post image
New Hijack Loader Variant: Uses Process Hollo...
watchers 244
comments 0
post image
A Guide to ANY.RUN’s YARA Search 
watchers 260
comments 0

What is Amadey malware

First seen about 5 years ago, Amadey is a modular bot that enables it to act as a loader or infostealer. It is designed to perform a range of malicious activities, including reconnaissance, data exfiltration, and loading additional payloads, which range from banking trojans to DDoS tools. It targets all versions of Microsoft Windows.

This malware’s capabilities include:

  • Privilege escalation
  • UAC bypassing
  • Keystroke logging
  • Screen capture
  • Downloading additional malware

While many adversaries primarily use this malware as a keylogger to steal credentials, it can also transform infected devices into spam email senders or add them to a botnet that adversaries use to launch DDoS attacks.

However, that’s not everything this threat is capable of. Owing to its modular design, Amadey can significantly expand its range of attack targets, enabling the extraction of a broader variety of information, such as files, login credentials, and cryptocurrency wallets.

Furthermore, current Amadey variants can recognize more than 14 antivirus solutions. This ability allows the malware to intelligently deploy a payload designed to evade the specific antivirus product installed on the compromised device.

In addition, this malware can move laterally, propagating to devices within the same network by pushing EternalBlue exploit onto victims. Although outdated, EternalBlue remains relevant, especially in public sectors like government and education, where end-of-life software usage is widespread.

As for the origin of this threat, little is known at this point. Older activity associated it with GandCrab campaigns, which might connect Amadey to the REvil gang or one of their affiliates. Additionally, Amadey is distributed on Slavic-speaking underground forums, which possibly places its origin in one of the ex-USSR territories.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

How to get more information from Amadey malware

In ANY.RUN, users can safely detonate Amadey samples and analyze it dynamically in a fully interactive cloud sandbox. Our service automatically collects and displays the execution data in user-friendly formats, such as this process graph.

Analyze malware for free in a fully interactive cloud sandbox – sign up now!

amadey Figure 1: A graph showing Amadey’s execution process

ANY.RUN detects Amadey using Suricata rules, allowing analysts to identify both new and old samples from this family. We also provide configuration details. This way, analysts can access important sample information like its version, options, and C2 addresses. The configuration is typically extracted within the first 10 seconds of launching a task. This ensures quick access to information.

amadey malware Figure 2: Amadey’s malware configuration

Amadey infostealer execution process

Once, when Amadey initiates its execution, the malware duplicates itself into a TEMP folder (sometimes naming itself bguuwe.exe). Following that, it modifies the Registry and creates a scheduled task to achieve persistence. Subsequently, Amadey sets up C2 communication and transmits a system profile to the adversary's server. While active, Amadey takes screenshots at regular intervals and stores them in the TEMP directory, ready to be transmitted to the C2 server with subsequent POST requests.

Amadey often serves as a loader for other malicious programs, such as in this task.

Also, Amadey has a very specific structure of POST requests, that can be used to identify it with a high degree of probability:

Figure 3: Information about infected machine, exfiltrated by Amadey and sent to C2 amadey malware

Distribution of Amadey

Amadey primarily relies on spear-phishing emails containing malicious attachments, such as Microsoft Office documents, to target specific organizations or individuals. The email content is carefully crafted to appear legitimate, enticing the victim to open the attachment.

Alternatively, Amadey can employ exploit kits (Fallout and Rig), drive-by downloads, or be dropped as a payload by other malware (in recent cases it was distributed by SmokeLoader).

Amadey malware conclusion

Amadey malware presents a notable challenge for cybersecurity researchers. Its persistence and evasion techniques, coupled with a highly customizable modular architecture, make it a high-level threat. Understanding its various infection vectors, exploitation methods, and malicious activities is essential to develop effective countermeasures and improve our overall cybersecurity posture.

You can efficiently detect and examine threats such as Amadey, with the help of ANY.RUN interactive sandbox, which provides analysis results in minutes.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More
Azorult screenshot
Azorult
azorult trojan rat
AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy