MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e52a6b8ce269e1b7e5b867cff03b89b00f053796386829222777196875655fbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Amadey


Vendor detections: 9


Intelligence 9 IOCs YARA 28 File information Comments

SHA256 hash: e52a6b8ce269e1b7e5b867cff03b89b00f053796386829222777196875655fbd
SHA3-384 hash: 000cf0f92871bbf54631db8e14d2f705c0059a3384c01edab3b28ae2e24b19d2d6b2b8bf5c0d8a7170751319fa09234d
SHA1 hash: cc502785ba12f202dc3e2e4e98e46d3c074e0623
MD5 hash: cad072625f58988f1773fb23e9e38ff0
humanhash: william-april-virginia-stairway
File name:SETUP.zip
Download: download sample
Signature Amadey
File size:10'754'719 bytes
First seen:2025-04-29 11:39:15 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 196608:1ynCinKkAZYgmFVrW9B1bNqifykWRtJRGguBb2HZf9cB6R1TWW2Ad:ICcvWYvWb1pqCgiuTWC
TLSH T143B63362E39094EEC23D077949E36B71BBB6D03642F722865B3650696DB23453D30FCA
Magika zip
Reporter aachum
Tags:Amadey file-pumped LummaStealer zip


Avatar
iamaachum
https://zasdxcvfdsxccdff.click/?1yY9GbpnTXr6LHjIodE58VFD0SNQ3gxZiakMw4vt=QsyaxP8XYZTk05bIS7EgheoHVGvp4LmOC1izFwUAJtf=4zrlDXqgMWQIxivwuLFbBaTO27tZPGySJ9k6HceA8sjY1h3&p_title=0TZFE48qx2eUGpNVzkiI3hDLY1l => https://mega.nz/file/dt5mxBiQ#owHD6qen3oB6nbhCmHp34cyTbrCpKEbE0xQCJNhbpcE

Intelligence


File Origin
# of uploads :
1
# of downloads :
291
Origin country :
ES ES
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:setup.exe
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:752'833'984 bytes
SHA256 hash: 21c40ac93892e1e5e136718c251f3410241ff64423d358d32417376b613bc7f2
MD5 hash: eda391da55d811d8c06dfd01cf5c5507
De-pumped file size:22'384'640 bytes (Vs. original size of 752'833'984 bytes)
De-pumped SHA256 hash: 8aecd82f1657ec863032e6b326d0c91a7599200a0ef9ba4bfe88a9da5256de8c
De-pumped MD5 hash: 1a2d0fd61c88e6418f984f78884662e6
MIME type:application/x-dosexec
Signature Amadey
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
phishing
Result
Verdict:
Malicious
File Type:
ZIP File - Malicious
Behaviour
SuspiciousEmbeddedObjects detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context bloated expired-cert fingerprint genheur invalid-signature keylogger large-file lolbin microsoft_visual_cc overlay packed regedit signed
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2025-04-26 13:26:42 UTC
File Type:
Binary (Archive)
Extracted files:
21
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:lumma botnet:200131 discovery persistence spyware stealer trojan
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Program crash
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Amadey
Amadey family
Lumma Stealer, LummaC
Lumma family
Malware Config
C2 Extraction:
https://techcastlev.live/kghk
https://805longitudde.digital/wizu
https://hemispherexz.top/xapp
https://equatorf.run/reiq
https://latitudert.live/teui
https://longitudde.digital/wizu
https://climatologfy.top/kbud
http://tackleoutplayed.com
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Bolonyokte
Author:Jean-Philippe Teissier / @Jipe_
Description:UnknownDotNet RAT - Bolonyokte
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:win_rat_generic
Author:Reedus0
Description:Rule for detecting generic RAT malware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Amadey

zip e52a6b8ce269e1b7e5b867cff03b89b00f053796386829222777196875655fbd

(this sample)

  
Delivery method
Distributed via web download

Comments