MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7fa4f11b5454210e0a44dc55a7124fb4107f00af6381ce8e9386bb7256b111fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Amadey
Vendor detections: 16
| SHA256 hash: | 7fa4f11b5454210e0a44dc55a7124fb4107f00af6381ce8e9386bb7256b111fa |
|---|---|
| SHA3-384 hash: | cbaa5da21f9022d5c47b7152d607fa76deb7abe5b0e995e2aa7e722bec6a362dc6caca4989ded9199fc88001d3001056 |
| SHA1 hash: | 79266234d72d845efe6f1a86dec793c8b9177d01 |
| MD5 hash: | 0c4087661372afce364ee74c8ea0cf36 |
| humanhash: | california-michigan-illinois-spaghetti |
| File name: | 0c4087661372afce364ee74c8ea0cf36.exe |
| Download: | download sample |
| Signature | Amadey |
| File size: | 1'125'888 bytes |
| First seen: | 2023-09-27 04:00:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:qyt6T62CLHAsV1e9cdZwesaeO3altmd6f6gY5rY:xti6dEvSjL3ymACd |
| Threatray | 1'767 similar samples on MalwareBazaar |
| TLSH | T1A835220BE3D94473C4F22B7095FB06974B3A7CF1793C43AB01229A9E5D72694A13276E |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | Amadey exe |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
Unpacked files
42ed23c246987d8571ae0107d50cbf02e5b11e28d29691799c8f45043606b554
c935672ad5eca6767f86bf2fc51e180be972bbd9c37f54e0d528464881422f7f
f7bf7b59ad64aed741bef76605e88e328af5eef187d5502384c471433f749b85
7fa4f11b5454210e0a44dc55a7124fb4107f00af6381ce8e9386bb7256b111fa
3556d214bbb39a834f38df3bf0ddeab6f87bcbd01fa08fa52129835901f3b4ad
db94be97eb084627d18d22c33babccd8cafbf99929117208e44ac4191fa767f9
c241af3fd9eba3f52028a34a84ce8654a8240779dee7a6579c6e658391379dab
121d34fe68492c95fc0c07b5cf0bf2e05dede7756821260fe21db7fecf431baf
21d322af62df797f246751c43f1dfab067fab4d114672cf60055bb1895af006b
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.