Report - cred64.dll

Amadey Generic Malware Malicious Library UPX Antivirus PE File DLL PE64 OS Processor Check
ScreenShot
Created 2025.03.10 10:11 Machine s1_win7_x6401
Filename cred64.dll
Type PE32+ executable (DLL) (GUI) x86-64, for MS Windows
AI Score
5
Behavior Score
9.8
ZERO API file : malware
VT API (file) 50 detected (Malicious, score, TrojanPWS, Zusy, Unsafe, Save, confidence, 100%, GenusT, EPRA, Attribute, HighConfidence, high confidence, BotX, flka, TrojanPSW, 79I7EMKuNSC, tdlvq, Detected, Etset, Kryptik, Eldorado, R684665, Artemis, PasswordStealer, Chgt, R002H0CC825, Szfl)
md5 3f6c5625fc83f2db9559554f6d1ce3f2
sha256 080ea1d225c77364abb02fbb1b65e9693654242ecc5c91f34c531ecf363a2f4c
ssdeep 24576:CrR0NaOy0mK9yCksn6JCc2YkxfUyamitsDw+mLRaSOnW:CkHmiyCkhh2Bamituw+U86
imphash 3f175edea93fa7a76a78004d12de2235
impfuzzy 96:ZZtu7Ze6BF1V5g4uAc0aR6x0xtnXnlBga79v8QRDTk:Ttu7Z3F5a1N9jTk
  Network IP location

Signature (24cnts)

Level Description
danger File has been identified by 50 AntiVirus engines on VirusTotal as malicious
watch Attempts to access Bitcoin/ALTCoin wallets
watch Communicates with host for which no DNS query was performed
watch Harvests credentials from local FTP client softwares
watch Harvests information related to installed instant messenger clients
watch The process powershell.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Searches running processes potentially to identify processes for sandbox evasion
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path
info Tries to locate where the browsers are installed
info Uses Windows APIs to generate a cryptographic key

Rules (9cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Antivirus Contains references to security software binaries (download)
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsDLL (no description) binaries (upload)
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.125.50.8/mVsXkjvb3/index.php Unknown 185.125.50.8 44173 mailcious
185.125.50.8 Unknown 185.125.50.8 mailcious

Suricata ids

PE API

IAT(Import Address Table) Library

CRYPT32.dll
 0x1800fe070 CryptUnprotectData
KERNEL32.dll
 0x1800fe080 GetFullPathNameA
 0x1800fe088 SetEndOfFile
 0x1800fe090 UnlockFileEx
 0x1800fe098 GetTempPathW
 0x1800fe0a0 CreateMutexW
 0x1800fe0a8 WaitForSingleObject
 0x1800fe0b0 CreateFileW
 0x1800fe0b8 GetFileAttributesW
 0x1800fe0c0 GetCurrentThreadId
 0x1800fe0c8 UnmapViewOfFile
 0x1800fe0d0 HeapValidate
 0x1800fe0d8 HeapSize
 0x1800fe0e0 MultiByteToWideChar
 0x1800fe0e8 Sleep
 0x1800fe0f0 GetTempPathA
 0x1800fe0f8 FormatMessageW
 0x1800fe100 GetDiskFreeSpaceA
 0x1800fe108 GetLastError
 0x1800fe110 GetFileAttributesA
 0x1800fe118 GetFileAttributesExW
 0x1800fe120 OutputDebugStringW
 0x1800fe128 CreateFileA
 0x1800fe130 LoadLibraryA
 0x1800fe138 WaitForSingleObjectEx
 0x1800fe140 DeleteFileA
 0x1800fe148 DeleteFileW
 0x1800fe150 HeapReAlloc
 0x1800fe158 CloseHandle
 0x1800fe160 GetSystemInfo
 0x1800fe168 LoadLibraryW
 0x1800fe170 HeapAlloc
 0x1800fe178 HeapCompact
 0x1800fe180 HeapDestroy
 0x1800fe188 UnlockFile
 0x1800fe190 GetProcAddress
 0x1800fe198 CreateFileMappingA
 0x1800fe1a0 LocalFree
 0x1800fe1a8 LockFileEx
 0x1800fe1b0 GetFileSize
 0x1800fe1b8 DeleteCriticalSection
 0x1800fe1c0 GetCurrentProcessId
 0x1800fe1c8 GetProcessHeap
 0x1800fe1d0 SystemTimeToFileTime
 0x1800fe1d8 FreeLibrary
 0x1800fe1e0 WideCharToMultiByte
 0x1800fe1e8 GetSystemTimeAsFileTime
 0x1800fe1f0 GetSystemTime
 0x1800fe1f8 FormatMessageA
 0x1800fe200 CreateFileMappingW
 0x1800fe208 MapViewOfFile
 0x1800fe210 QueryPerformanceCounter
 0x1800fe218 GetTickCount
 0x1800fe220 FlushFileBuffers
 0x1800fe228 SetHandleInformation
 0x1800fe230 FindFirstFileA
 0x1800fe238 Wow64DisableWow64FsRedirection
 0x1800fe240 K32GetModuleFileNameExW
 0x1800fe248 FindNextFileA
 0x1800fe250 CreatePipe
 0x1800fe258 PeekNamedPipe
 0x1800fe260 lstrlenA
 0x1800fe268 FindClose
 0x1800fe270 GetCurrentDirectoryA
 0x1800fe278 lstrcatA
 0x1800fe280 OpenProcess
 0x1800fe288 SetCurrentDirectoryA
 0x1800fe290 CreateToolhelp32Snapshot
 0x1800fe298 ProcessIdToSessionId
 0x1800fe2a0 CopyFileA
 0x1800fe2a8 Wow64RevertWow64FsRedirection
 0x1800fe2b0 Process32NextW
 0x1800fe2b8 Process32FirstW
 0x1800fe2c0 CreateThread
 0x1800fe2c8 CreateProcessA
 0x1800fe2d0 CreateDirectoryA
 0x1800fe2d8 WriteConsoleW
 0x1800fe2e0 InitializeCriticalSection
 0x1800fe2e8 LeaveCriticalSection
 0x1800fe2f0 LockFile
 0x1800fe2f8 OutputDebugStringA
 0x1800fe300 GetDiskFreeSpaceW
 0x1800fe308 WriteFile
 0x1800fe310 GetFullPathNameW
 0x1800fe318 EnterCriticalSection
 0x1800fe320 HeapFree
 0x1800fe328 HeapCreate
 0x1800fe330 TryEnterCriticalSection
 0x1800fe338 ReadFile
 0x1800fe340 AreFileApisANSI
 0x1800fe348 SetFilePointer
 0x1800fe350 ReadConsoleW
 0x1800fe358 SetFilePointerEx
 0x1800fe360 GetFileSizeEx
 0x1800fe368 GetConsoleMode
 0x1800fe370 GetConsoleOutputCP
 0x1800fe378 SetEnvironmentVariableW
 0x1800fe380 FreeEnvironmentStringsW
 0x1800fe388 GetEnvironmentStringsW
 0x1800fe390 GetCommandLineW
 0x1800fe398 GetCommandLineA
 0x1800fe3a0 GetOEMCP
 0x1800fe3a8 GetACP
 0x1800fe3b0 IsValidCodePage
 0x1800fe3b8 FindNextFileW
 0x1800fe3c0 FindFirstFileExW
 0x1800fe3c8 SetStdHandle
 0x1800fe3d0 GetCurrentDirectoryW
 0x1800fe3d8 RtlCaptureContext
 0x1800fe3e0 RtlLookupFunctionEntry
 0x1800fe3e8 RtlVirtualUnwind
 0x1800fe3f0 UnhandledExceptionFilter
 0x1800fe3f8 SetUnhandledExceptionFilter
 0x1800fe400 GetCurrentProcess
 0x1800fe408 TerminateProcess
 0x1800fe410 IsProcessorFeaturePresent
 0x1800fe418 IsDebuggerPresent
 0x1800fe420 GetStartupInfoW
 0x1800fe428 GetModuleHandleW
 0x1800fe430 InitializeSListHead
 0x1800fe438 LCMapStringEx
 0x1800fe440 InitializeCriticalSectionEx
 0x1800fe448 EncodePointer
 0x1800fe450 DecodePointer
 0x1800fe458 CompareStringEx
 0x1800fe460 GetCPInfo
 0x1800fe468 GetStringTypeW
 0x1800fe470 RtlUnwindEx
 0x1800fe478 RtlPcToFileHeader
 0x1800fe480 RaiseException
 0x1800fe488 InterlockedFlushSList
 0x1800fe490 SetLastError
 0x1800fe498 InitializeCriticalSectionAndSpinCount
 0x1800fe4a0 TlsAlloc
 0x1800fe4a8 TlsGetValue
 0x1800fe4b0 TlsSetValue
 0x1800fe4b8 TlsFree
 0x1800fe4c0 LoadLibraryExW
 0x1800fe4c8 ExitThread
 0x1800fe4d0 FreeLibraryAndExitThread
 0x1800fe4d8 GetModuleHandleExW
 0x1800fe4e0 GetDriveTypeW
 0x1800fe4e8 GetFileInformationByHandle
 0x1800fe4f0 GetFileType
 0x1800fe4f8 SystemTimeToTzSpecificLocalTime
 0x1800fe500 FileTimeToSystemTime
 0x1800fe508 ExitProcess
 0x1800fe510 GetModuleFileNameW
 0x1800fe518 CompareStringW
 0x1800fe520 LCMapStringW
 0x1800fe528 GetLocaleInfoW
 0x1800fe530 IsValidLocale
 0x1800fe538 GetUserDefaultLCID
 0x1800fe540 EnumSystemLocalesW
 0x1800fe548 GetTimeZoneInformation
 0x1800fe550 GetStdHandle
ADVAPI32.dll
 0x1800fe000 RegQueryValueExA
 0x1800fe008 RegEnumValueW
 0x1800fe010 RegEnumKeyA
 0x1800fe018 RegCloseKey
 0x1800fe020 RegQueryInfoKeyW
 0x1800fe028 RegOpenKeyA
 0x1800fe030 RegOpenKeyExA
 0x1800fe038 GetSidSubAuthorityCount
 0x1800fe040 GetSidSubAuthority
 0x1800fe048 GetUserNameA
 0x1800fe050 RegEnumKeyExW
 0x1800fe058 LookupAccountNameA
 0x1800fe060 GetSidIdentifierAuthority
SHELL32.dll
 0x1800fe560 SHGetFolderPathA
 0x1800fe568 SHFileOperationA
WININET.dll
 0x1800fe578 HttpOpenRequestA
 0x1800fe580 InternetWriteFile
 0x1800fe588 InternetReadFile
 0x1800fe590 InternetConnectA
 0x1800fe598 HttpSendRequestA
 0x1800fe5a0 InternetCloseHandle
 0x1800fe5a8 InternetOpenA
 0x1800fe5b0 HttpAddRequestHeadersA
 0x1800fe5b8 HttpSendRequestExW
 0x1800fe5c0 HttpEndRequestA
 0x1800fe5c8 InternetOpenW
crypt.dll
 0x1800fe5d8 BCryptOpenAlgorithmProvider
 0x1800fe5e0 BCryptSetProperty
 0x1800fe5e8 BCryptGenerateSymmetricKey
 0x1800fe5f0 BCryptDecrypt

EAT(Export Address Table) Library

0x1800bfda0 Main
0x1800056d0 Save


Similarity measure (PE file only) - Checking for service failure