MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d2d7935d6fac745234eea85e2a83ba31d71509727bf01ec6f418980dfae6167. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 19


Intelligence 19 IOCs 1 YARA 19 File information Comments

SHA256 hash: 5d2d7935d6fac745234eea85e2a83ba31d71509727bf01ec6f418980dfae6167
SHA3-384 hash: e3f50118f13ee30ace98388f0e046809d0e59508e773e927ce753616558115e7a4a4e10497ca646feef305f114fc0da4
SHA1 hash: 15d10baf370431290a04a67c6a17c1b55e160b5d
MD5 hash: 2d6143fc1112eaca6533e945c9e24585
humanhash: montana-spaghetti-thirteen-friend
File name:x5d2d7935d6fac745234eea85e2a83ba31d71509727bf.exe
Download: download sample
Signature Amadey
File size:1'204'736 bytes
First seen:2026-03-15 04:00:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 150451e02d49e46634c10e914db67920 (4 x Smoke Loader, 2 x Stealc, 2 x Amadey)
ssdeep 12288:WhHPpJr9E2mFbAZFo5OweM9Bf/urzZq66F0FKL66F0FK:KHPpJi2mWZF3M9Bf/upXFKWFK
Threatray 403 similar samples on MalwareBazaar
TLSH T13E45D760D2D9C910CAB7AD316FE49D54ED2821E35A354A08F0ED3A27DF7394389733A6
TrID 56.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.1% (.EXE) Win32 Executable (generic) (4504/4/1)
3.7% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:Amadey exe


Avatar
abuse_ch
Amadey C2:
http://tve-mail.com/forum/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://tve-mail.com/forum/index.php https://threatfox.abuse.ch/ioc/1766760/

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
NL NL
Vendor Threat Intelligence
Malware configuration found for:
AceCryptor Amadey
Details
AceCryptor
an extracted shellcode loader component and a TEA decryption key
AceCryptor
an extracted payload
AceCryptor
an extracted shellcode loader component and the ms_c_rand-XOR seed
Amadey
a c2 url and a version
Malware family:
ID:
1
File name:
x5d2d7935d6fac745234eea85e2a83ba31d71509727bf01ec6f418980dfae6167.exe
Verdict:
Malicious activity
Analysis date:
2026-03-15 03:44:02 UTC
Tags:
auto-reg amadey botnet stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
phishing autorun
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
amadey evasive explorer fingerprint glupteba krypt lolbin microsoft_visual_cc overlay packed smoke smokeloader smokeloader unsafe windows zusy
Verdict:
Malicious
Labled as:
Ransom_Win32_StopCrypt_IDL_MTB
Result
Gathering data
Verdict:
Malicious
File Type:
exe x32
Detections:
Trojan.Win32.Chapak.sb Trojan.Win32.Autorun.sb HEUR:Trojan-PSW.Win32.Stealerc.gen HEUR:Trojan-Downloader.Win32.GCleaner.gen Trojan-Dropper.Win32.Agent.sb Trojan-Downloader.Win32.Upatre.sb Trojan.Win32.Strab.sb Trojan.Win32.Agent.sb PDM:Trojan.Win32.Generic Trojan-Downloader.Win32.Deyma.sb Trojan.Win32.Zenpak.sb Trojan.Win32.Yakes.sb
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Posts data to a JPG file (protocol mismatch)
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Unusual module load detection (module proxying)
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1883921 Sample: x5d2d7935d6fac745234eea85e2... Startdate: 15/03/2026 Architecture: WINDOWS Score: 100 34 tve-mail.com 2->34 36 sibcomputer.ru 2->36 38 shohetrc.com 2->38 46 Suricata IDS alerts for network traffic 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 52 6 other signatures 2->52 8 x5d2d7935d6fac745234eea85e2a83ba31d71509727bf.exe 4 2->8         started        signatures3 process4 file5 30 C:\Users\user\AppData\Local\...\Utsysc.exe, PE32 8->30 dropped 32 C:\Users\user\...\Utsysc.exe:Zone.Identifier, ASCII 8->32 dropped 54 Detected unpacking (changes PE section rights) 8->54 56 Detected unpacking (overwrites its own PE header) 8->56 58 Contains functionality to inject code into remote processes 8->58 60 Unusual module load detection (module proxying) 8->60 12 Utsysc.exe 8->12         started        16 WerFault.exe 16 8->16         started        18 WerFault.exe 16 8->18         started        20 8 other processes 8->20 signatures6 process7 dnsIp8 40 sibcomputer.ru 34.41.139.193, 49742, 49743, 49746 ATGS-MMD-ASUS United States 12->40 42 tve-mail.com 52.16.171.153, 49740, 49745, 49749 AMAZON-02US United States 12->42 44 shohetrc.com 34.209.195.255, 49739, 49741, 49744 AMAZON-02US United States 12->44 62 Multi AV Scanner detection for dropped file 12->62 64 Detected unpacking (changes PE section rights) 12->64 66 Detected unpacking (overwrites its own PE header) 12->66 68 2 other signatures 12->68 22 WerFault.exe 12->22         started        24 WerFault.exe 12->24         started        26 WerFault.exe 12->26         started        28 WerFault.exe 12->28         started        signatures9 process10
Gathering data
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2026-03-14 22:24:22 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey botnet:92ef9d discovery execution persistence trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Checks computer location settings
Executes dropped EXE
Amadey
Amadey family
Detects Amadey x86-bit Payload
Malware Config
C2 Extraction:
http://shohetrc.com
http://sibcomputer.ru
http://tve-mail.com
Unpacked files
SH256 hash:
5d2d7935d6fac745234eea85e2a83ba31d71509727bf01ec6f418980dfae6167
MD5 hash:
2d6143fc1112eaca6533e945c9e24585
SHA1 hash:
15d10baf370431290a04a67c6a17c1b55e160b5d
SH256 hash:
f169750c922fd27298748f97c1a9e2b8442fb4d2d5d85f35f61528c4df6b3718
MD5 hash:
b0aa0a177f2193739bb3ee81245dbe67
SHA1 hash:
683cc9723ede300b072d2124c031d7dd0a0cf472
Detections:
win_amadey_auto Amadey win_amadey_bytecodes_oct_2023 win_amadey
Parent samples :
75521cc92675383e1f9b8996fd925345e562da8b2a2aedb9cebacb9cc0ee0a80
6d3cd39358c91c56b4798b64c73f03e3877a80dffe01d07e2ad13e979e845ed0
75b6b00dcdb1025df8a76e02a7c989b5c6d670e0dcf1737be4f20641b89cde77
92b44334a248b6b3850c38fc3aadb63d0ae1828cc2a6617be41299eb4707d82e
a0b708c25e2fce2346235d0bb42abc98432e664bec6e925a04e9636277ead082
470cf66bec58f48d4290d8440bef7c00fcfbd0f334504c5d2ac6739b8929ea7b
ff625dd0483caccac07b4233e3f8174a2237b8382da090067dc66213f5d9c8f5
a4528e6b733c6b595e93e3d50fb849edbe9fcd062b65fb2bd4ae5d8d76ac5b76
c3f6354c94ae880d0254f356f2836aaf4aec81b903e4054f75f6e517183e9fce
f4bdddb45e727c8699340ba8d520a37e07b0becb4c571a67b3c9f4ce3a138213
6acb3b43d98f272ef65bd7499ebd99cc2e55b5e361cde052d0c2f49ce78d4bc4
ac5191f13cd12090eee4819aa75fe5795df43a9e3101753666734ab2ad5da168
7641c8716c89830b2b05ef92da76bbb5df735ab1190d3e1c9a885659e36dd870
ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
7cf75feeb9ad3bda1abf8bc0178d09db7fa7789f196211089009daf6710112c3
394329c7d7e4a32315dca5462c00b35c78fff9f0d04c5d5e4ad3667be28ee9be
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
b70d16a1fda7970ec06e9250b6215062d4a77b7c3bf52a75195ba8cce285643b
52286333dc380793b2fa162afcbdb93a25372296e6940df42a2b6c99389dc09b
8bcccf59138121a79462b275dd0f966928fa84743c40ad9536652a3b09053c66
5abd71acc7aaa2bb26c92e6c5d1827b20b8157f74b612b3bd1a6b79e2bd6a2e6
67909ab71ebdcfd08df25ecd355c568a3c6717fffc20096fc729a6671e833cc4
2b3b153fd47433b92c199c148d5a2a431e107cae6ad2be0a07d0fe5ea9227285
35444ec8434846a91960534af1f3cf875096c4c5aa869e7612a06327ddf616bd
83ba1a2e58efd33c3704178256b78a8cce40e83e994043aecf40523d41e7bd69
27ad905e0fa63d89cb28e5079d24b1551ecbc7b969ac9499a07e34a187837503
2ccc324158b3b0668c66a3434391b73c4865ffacad98b44d33178048314e3894
5d2d7935d6fac745234eea85e2a83ba31d71509727bf01ec6f418980dfae6167
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Amadey
Author:kevoreilly, YungBinary
Description:Amadey Payload
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:Windows_Generic_Threat_66142106
Author:Elastic Security
Rule name:Windows_Generic_Threat_bd24be68
Author:Elastic Security
Rule name:Windows_Trojan_Generic_2993e5a5
Author:Elastic Security
Rule name:Windows_Trojan_Smokeloader_ea14b2a5
Author:Elastic Security
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples
Rule name:win_amadey_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.amadey.
Rule name:win_amadey_bytecodes_oct_2023
Author:Matthew @ Embee_Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments