MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1c1b7b481b545be25c3c4257d32d78d36d01af819143c3a6fbfafad8ba9829d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Amadey
Vendor detections: 15
| SHA256 hash: | 1c1b7b481b545be25c3c4257d32d78d36d01af819143c3a6fbfafad8ba9829d7 |
|---|---|
| SHA3-384 hash: | ffa507ca04e4e7c4ec41ac3f44c7d725d16bd4a144f8d57e0f27a9ce6017f92ea8f6b0a72018124c0582bb3743c44045 |
| SHA1 hash: | a5a1a7da1ae620eb0bfe9a30aef18f78421fd956 |
| MD5 hash: | 2bd8ce3f336859a8a76bc36b571e55ed |
| humanhash: | seven-cardinal-william-zulu |
| File name: | 2bd8ce3f336859a8a76bc36b571e55ed.exe |
| Download: | download sample |
| Signature | Amadey |
| File size: | 1'055'744 bytes |
| First seen: | 2023-07-15 13:50:33 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:xyFdCeo19A/3cvsxDcxylV14eTG4wmqIAZp:kLdiA3bYWV1VbqIA |
| Threatray | 1'125 similar samples on MalwareBazaar |
| TLSH | T175252347EAD8C132EAF027708EF613D30E35B8915E38916F67D6155B0DB3682A832776 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | Amadey exe |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
ae8d01346f816e073b1e3d2465012710cd2bdecb26c8bec7fc5ff9fe2b5fb93c
343654200c9db2a900567314c843bc6ed5e3cec03733e0b0c05d0f3d656a44ff
1c1b7b481b545be25c3c4257d32d78d36d01af819143c3a6fbfafad8ba9829d7
2e0a9b6a39ce81b93beb155ac3c237f4a6b9248d6b872ed22bfdf8851796b19b
5de64d5ab56bad52329947e26f8110fed2348f921e93665a3999fc44153d6ef8
0938a999b8caf4ac0b0ae0df1eb9b0b22dec4dfbfa3b4cb4ac6b6fdd35c3f7a3
6bd55afbdee9bee40494e1ad8d221009af60fed046a9028662aea7d0d54f2d65
21feb39957e192116f1449fe8d8fdf2104aaaef3e4f6a5e516adc72ef63dbd32
93cc0b218af5fa6bba939d6cfd87fbd1bedd0a1a8b202f41682f558dd2465c99
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.