MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 53a1c4eb6bd63f543220e90cb7543a84ad6aadfdf2c5fc4331f726a21518557c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Amadey
Vendor detections: 14
| SHA256 hash: | 53a1c4eb6bd63f543220e90cb7543a84ad6aadfdf2c5fc4331f726a21518557c |
|---|---|
| SHA3-384 hash: | eed137ac673eac72d61cb8d30bac7a5810631177971b39a77588374f3e41b08b382ab9d38a6ab7203d3f3b1eb9939288 |
| SHA1 hash: | af84e68f7e4c641d6a3a58befc6ee5a05d47bd70 |
| MD5 hash: | bad1754c94251b2c78c00144697c3518 |
| humanhash: | asparagus-oxygen-carbon-iowa |
| File name: | file |
| Download: | download sample |
| Signature | Amadey |
| File size: | 1'632'768 bytes |
| First seen: | 2023-10-27 06:20:20 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:3yOOZY87XITfPZqHEQ91/eJctmKdV7QzysP2sZZhk5bra:CH7XIbPZtQn/eJctmKbQOsPD/O5br |
| Threatray | 2'641 similar samples on MalwareBazaar |
| TLSH | T1B5752343EAE8A4B3D6F20F754CF202D3063ABEA9ADB0934F3B9659561871150643237F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | Amadey exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
http://195.123.218.98:80
http://31.192.23
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.