MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 855fd4cf224283ecfadcbbde8f8bda52096a389946f6890fa83b09e26cea10dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Amadey
Vendor detections: 14
| SHA256 hash: | 855fd4cf224283ecfadcbbde8f8bda52096a389946f6890fa83b09e26cea10dc |
|---|---|
| SHA3-384 hash: | 498c0ce15abdf78ba3b326b5e5dca4e1a4a4a305111dc5093fd187b93f85db3166f8d945e755d643869e76a482b1eb74 |
| SHA1 hash: | ecc8cafe83d4ce841894c78a6add9841174738ef |
| MD5 hash: | f4c9a2e04bf7425f92b4dfa743985d4b |
| humanhash: | solar-south-white-delta |
| File name: | file |
| Download: | download sample |
| Signature | Amadey |
| File size: | 1'056'256 bytes |
| First seen: | 2023-07-14 18:53:12 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 12288:pMrXy90AnEbF79w5lfUQYeJ+CMGNfrZlcROl1Eh3CkczpbZ7wyYirGZUq0dTlpLx:iyUZ5wTf/IGhPc8lUspb+g2U/Tlpv5 |
| Threatray | 1'026 similar samples on MalwareBazaar |
| TLSH | T103252351F9E84873DDBA437009F617C70B32BC925C78927B3696A68E0DB2AD4843537B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | Amadey exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.