BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

Amadey

27
Global rank
11
Month rank
16
Week rank
1245
IOCs

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Infostealer
Type
Likely ex-USSR
Origin
13 October, 2018
First seen
2 December, 2023
Last seen
Also known as
Amadey Bot

How to analyze Amadey with ANY.RUN

Infostealer
Type
Likely ex-USSR
Origin
13 October, 2018
First seen
2 December, 2023
Last seen

IOCs

Hashes
9da10d7b75c589f06f1758ed8e3c0335b9a738d0ad1317c48e380bca768bdddf
4d8c0db6f80b18f6921997683325a03af3baf26ea542e99b951488cf6438b93f
68cf6c33c3a11405e8f66b1cd769ac4b9ed53fa702d06323d737f86bb238f0aa
60c8323532736b7b87059b1f097c20f3666add44977a747dd8fee60117409922
1ee1af8c502f735b25ac8897db327366e6855fc6f1baaca80d6ac8effe616ab4
3141087bc31d396d4151e1bf8b61254374b503faefe444f17316ac40ba5c845b
e69d5c216d6c6a21bc7517d4f3972a1cec827b943e06db64f7206841ed32d14e
33edf14e86c03fe41ef5b011e364791fd6aaaaac40d620be9b377450620de65c
d6780e515a8143aa9d8097deae4cba874790690f6743c51f8e03a1af4cf7c0b8
9c2b3a7c5abdcd9cfbafc27cddcdd4054cea214e15d3a1666cf407d2479a1f7e
a6bd53b43ef7820cb928829288276a9dc67c2746b8e07f0e83413cfacd2edfea
cf78e087403fb0ec59f8c1100603622480dfafd0d651ec0244e715f4bab867f0
c9857abb97c35dcba1a740d982e11f09bd8e47c4e40826f8ae8051f06e109449
371c1e62cbc18626b2cc6ba6893b71e9a9d945fc5391b5b85ee4ff2b7500f11e
1fb2e848188b19f262e131fe524d450413b8e739c50c252a40291e6434bf396b
4639b24c3c99c20d067b4e3b0fd095afd516ca4dc86237f37b0e692b2afce0e7
06fcfe784a220b6515b8db1471567625bd8150878b404c8c96954e37c556488e
c2fca574ef7cb4910a9071c92f92d29dca8cab3b6f75744ffb3916e95cc10c37
b1635ba27455cb073d74e42a0592e4454c18231f85f5d725c135aa1d0009ca20
4fdd5a61bfcdd6b7ae051750b79f133d59f23bdd7d2ebfcdf4c18880ce42cb08
URLs
http://185.172.128.19/ghsdh39s/index.php
http://77.91.76.37/g8samsA2/index.php
http://77.91.76.37/g8samsA2/Plugins/clip.dll
http://77.91.76.37/g8samsA2/Plugins/cred.dll
http://185.172.128.100/u6vhSc3PPq/index.php
http://185.172.128.19/toolspub2.exe
http://185.172.128.19/InstallSetup9.exe
http://185.172.128.19/Fineone.exe
http://185.172.128.19/latestmar.exe
http://185.172.128.19/newmar.exe
http://185.172.128.19/brandmar.exe
http://sibcomputer.ru/forum/Plugins/cred64.dll
http://shohetrc.com/forum/Plugins/clip64.dll
http://shohetrc.com/forum/Plugins/cred64.dll
http://sibcomputer.ru/forum/index.php
http://shohetrc.com/forum/index.php
http://77.91.124.1/
http://185.172.128.100/
http://65.108.99.238/yXNwKVfkS28Y/index.php
http://65.108.99.238/yXNwKVfkS28Y/Plugins/clip64.dll
Last Seen at
Last Seen at

Recent blog posts

3 Cybersecurity Events ANY.RUN Attended in No...
watchers 142
comments 0
5 malware threats we discovered in the wild i...
watchers 345
comments 0
RisePro Malware Analysis: Exploring C2 Commun...
watchers 2314
comments 0

What is Amadey malware

First seen about 5 years ago, Amadey is a modular bot that enables it to act as a loader or infostealer. It is designed to perform a range of malicious activities, including reconnaissance, data exfiltration, and loading additional payloads, which range from banking trojans to DDoS tools. It targets all versions of Microsoft Windows.

This malware’s capabilities include:

  • Privilege escalation
  • UAC bypassing
  • Keystroke logging
  • Screen capture
  • Downloading additional malware

While many adversaries primarily use this malware as a keylogger to steal credentials, it can also transform infected devices into spam email senders or add them to a botnet that adversaries use to launch DDoS attacks.

However, that’s not everything this threat is capable of. Owing to its modular design, Amadey can significantly expand its range of attack targets, enabling the extraction of a broader variety of information, such as files, login credentials, and cryptocurrency wallets.

Furthermore, current Amadey variants can recognize more than 14 antivirus solutions. This ability allows the malware to intelligently deploy a payload designed to evade the specific antivirus product installed on the compromised device.

In addition, this malware can move laterally, propagating to devices within the same network by pushing EternalBlue exploit onto victims. Although outdated, EternalBlue remains relevant, especially in public sectors like government and education, where end-of-life software usage is widespread.

As for the origin of this threat, little is known at this point. Older activity associated it with GandCrab campaigns, which might connect Amadey to the REvil gang or one of their affiliates. Additionally, Amadey is distributed on Slavic-speaking underground forums, which possibly places its origin in one of the ex-USSR territories.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

How to get more information from Amadey malware

In ANY.RUN, users can safely detonate Amadey samples and analyze it dynamically in a fully interactive cloud sandbox. Our service automatically collects and displays the execution data in user-friendly formats, such as this process graph.

Analyze malware for free in a fully interactive cloud sandbox – sign up now!

amadey Figure 1: A graph showing Amadey’s execution process

ANY.RUN detects Amadey using Suricata rules, allowing analysts to identify both new and old samples from this family. We also provide configuration details. This way, analysts can access important sample information like its version, options, and C2 addresses. The configuration is typically extracted within the first 10 seconds of launching a task. This ensures quick access to information.

amadey malware Figure 2: Amadey’s malware configuration

Amadey infostealer execution process

Once, when Amadey initiates its execution, the malware duplicates itself into a TEMP folder (sometimes naming itself bguuwe.exe). Following that, it modifies the Registry and creates a scheduled task to achieve persistence. Subsequently, Amadey sets up C2 communication and transmits a system profile to the adversary's server. While active, Amadey takes screenshots at regular intervals and stores them in the TEMP directory, ready to be transmitted to the C2 server with subsequent POST requests.

Amadey often serves as a loader for other malicious programs, such as in this task.

Also, Amadey has a very specific structure of POST requests, that can be used to identify it with a high degree of probability:

Figure 3: Information about infected machine, exfiltrated by Amadey and sent to C2 amadey malware

Distribution of Amadey

Amadey primarily relies on spear-phishing emails containing malicious attachments, such as Microsoft Office documents, to target specific organizations or individuals. The email content is carefully crafted to appear legitimate, enticing the victim to open the attachment.

Alternatively, Amadey can employ exploit kits (Fallout and Rig), drive-by downloads, or be dropped as a payload by other malware (in recent cases it was distributed by SmokeLoader).

Amadey malware conclusion

Amadey malware presents a notable challenge for cybersecurity researchers. Its persistence and evasion techniques, coupled with a highly customizable modular architecture, make it a high-level threat. Understanding its various infection vectors, exploitation methods, and malicious activities is essential to develop effective countermeasures and improve our overall cybersecurity posture.

You can efficiently detect and examine threats such as Amadey, with the help of ANY.RUN interactive sandbox, which provides analysis results in minutes.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More
Azorult screenshot
Azorult
azorult trojan rat
AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy