MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6ecf835556c666d9c17c11473060876684c92536382867c591c66110ff225f7c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Amadey
Vendor detections: 16
| SHA256 hash: | 6ecf835556c666d9c17c11473060876684c92536382867c591c66110ff225f7c |
|---|---|
| SHA3-384 hash: | 423c9bc80c04535f09975edce0ed6bc42e5e1248ac2064da2b94b2a9fdf9346be6f57ffbcf1ef0456e050a30f4947efc |
| SHA1 hash: | 24ea47ded658b54b96c7f78fb5986839ef43eb0d |
| MD5 hash: | da2692b6e62979609f5df7128e9e5a40 |
| humanhash: | hamper-harry-vermont-table |
| File name: | file |
| Download: | download sample |
| Signature | Amadey |
| File size: | 1'057'792 bytes |
| First seen: | 2023-10-17 14:07:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:vyXVbt51bQgz7yh9poJZDXXir93DJxD1OoTproHVn4:6X1rFD7yh9mDCyoFra |
| TLSH | T1842523137BDD913BD861A3B11CFA16C71E3BBCE29D3097A27264D52648B2EC09935327 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | Amadey exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://77.91.68.29/fks/
http://77.91.124.1/theme/index.php
85.209.176.128:80
185.216.70.238:37515
https://pastebin.com/raw/8baCJyMF
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | mal_healer |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | Payload disabling Windows AV |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.