MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f3a51d0624ebf838a483be1e6e463702f742e21e64548a0de99845270647965. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 18


Intelligence 18 IOCs YARA 35 File information Comments

SHA256 hash: 7f3a51d0624ebf838a483be1e6e463702f742e21e64548a0de99845270647965
SHA3-384 hash: 1c625c79877f91dbe22a466395728df003c6701a8bb3ce8cb7c53939491ad1dac7794d806b2507b88f9cd635c75cebbb
SHA1 hash: 065af859f4fcb2158b953c258ee052bc59e5b330
MD5 hash: 8d1688952f54d26ad86f9b612f45138f
humanhash: steak-arkansas-carbon-network
File name:file
Download: download sample
Signature Amadey
File size:22'842'880 bytes
First seen:2026-04-08 01:28:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5175da4b99d292f751a152b8e78310d6 (2 x Amadey, 1 x SVCStealer, 1 x AsyncRAT)
ssdeep 393216:+Eba1Fdq1B7wgZHsoqEbpibx2x7JFO7nE6p1XioJRa:Tba1Fg1Jnlbpdx7JFOVplioJo
Threatray 597 similar samples on MalwareBazaar
TLSH T15D371227B395127DE07B423689B2D231D6377C1167268D8B87E4295DDF3B2A02E3E712
TrID 29.5% (.EXE) Win64 Executable (generic) (6522/11/2)
22.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:282234 Amadey dropped-by-amadey exe


Avatar
Bitsight
url: http://62.60.226.159/mercy.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
180
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-04-08 01:29:31 UTC
Tags:
auto redline stealer auto-reg stealc anti-evasion metastealer auto-startup amadey botnet python inno installer delphi loader crypto-regex sainbox rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
ransomware installer dropper emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Enabling the 'hidden' option for recently created files
Sending a custom TCP request
Creating a file
DNS request
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Creating a window
Searching for synchronization primitives
Сreating synchronization primitives
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Connection attempt to an infection source
Stealing user critical data
Sending a TCP request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug base64 base64 expand explorer fingerprint lolbin meterpreter microsoft_visual_cc mikey obfuscated overlay packed reconnaissance redline stealer windows wmic
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-04-07T22:39:00Z UTC
Last seen:
2026-04-09T07:14:00Z UTC
Hits:
~100
Detections:
BSS:Trojan.Win32.Generic Trojan-Spy.Stealer.HTTP.C&C Trojan.Win32.Agent.sb Trojan-PSW.MSIL.Reline.aauz Trojan-Dropper.Win32.Injector.sb Trojan-PSW.Win32.Coins.sb Trojan-Spy.Agent.HTTP.ServerRequest Trojan.Agent.UDP.ServerRequest Trojan-Spy.Stealer.TCP.C&C HEUR:Trojan.Win32.Agent.gen Trojan-PSW.Win32.StealC.v2 HEUR:Trojan.Win64.Generic Trojan-Spy.Agent.HTTP.C&C HEUR:Trojan-Banker.Python.Clipbanker.gen Trojan-Downloader.Win32.Inject.sb Trojan.Win32.Denes.icu Trojan-PSW.Win64.StealC.sb HEUR:Trojan-Banker.Win32.ClipBanker.gen Trojan-Dropper.Win32.Agent.sb Trojan-Spy.Stealer.TCP.ServerRequest PDM:Trojan.Win32.Generic Trojan-PSW.Win32.Lumma.aclu HEUR:Trojan.Win64.Agent.gen.ia Backdoor.Win32.Androm.sb Backdoor.Agent.HTTP.C&C Trojan.Win32.Agent.xcdilu Trojan-PSW.Win32.Stealer.sb Trojan-PSW.MSIL.Reline.sb Trojan-Banker.Win32.ClipBanker.sb Trojan-PSW.Lumma.HTTP.Download Backdoor.Win32.Zegost.sb Trojan.Denes.UDP.C&C Trojan-Downloader.Agent.HTTP.C&C Trojan.Agentb.TCP.C&C Trojan-PSW.MSIL.Stealer.sb HEUR:Trojan-Spy.MSIL.Stealer.gen Trojan-Banker.Win32.Express.sb Trojan.Win64.Reflo.sb VHO:Trojan-PSW.Win32.StealC.gen VHO:Trojan-Spy.Win32.Agent.gen VHO:Backdoor.Win32.Agent.gen VHO:Backdoor.Win32.Androm.gen VHO:Trojan-PSW.MSIL.Reline.aauz VHO:Trojan.Win64.Agent.gen
Gathering data
Gathering data
Threat name:
Win64.Spyware.Metastealer
Status:
Malicious
First seen:
2026-04-08 01:29:31 UTC
File Type:
PE+ (Exe)
Extracted files:
42
AV detection:
25 of 37 (67.57%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:redline family:stealc family:svcstealer family:xworm botnet:282234 botnet:crypt botnet:fff defense_evasion discovery infostealer installer persistence privilege_escalation pyinstaller rat spyware stealer trojan upx
Behaviour
Checks processor information in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Access Token Manipulation: Create Process with Token
Detects Pyinstaller
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Downloads MZ/PE file
Amadey
Amadey family
Detect Xworm Payload
Detects Stealc stealer Version 2
RedLine
RedLine payload
Redline family
Stealc
Stealc family
Xworm
Xworm family
Malware Config
C2 Extraction:
196.251.107.104:1912
http://196.251.107.130
http://62.60.226.159
196.251.107.104:1177
62.60.226.159:1177
Malware family:
Stealc.v2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:detect_Redline_Stealer_V2
Author:Varp0s
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GenericRedLineLike
Author:Still
Description:Matches RedLine-like stealer; may match its variants.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:Heuristics_ChromeABE
Author:Still
Description:attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:Detects Reflective DLL injection artifacts
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_MetaStealer
Author:ditekSHen
Description:Detects MetaStealer infostealer
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:StealcV2
Author:Still
Description:attempts to match the instructions found in StealcV2
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:Windows_Generic_Threat_efdb9e81
Author:Elastic Security
Rule name:Windows_Trojan_Generic_40899c85
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_6dfafd7b
Author:Elastic Security
Rule name:Windows_Trojan_Stealc_41db1d4d
Author:Elastic Security
Rule name:win_redline_stealer_generic
Author:dubfib

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

Executable exe 7f3a51d0624ebf838a483be1e6e463702f742e21e64548a0de99845270647965

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments