MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ec8ecd3eb6f6ae79021abf7d3edb357d4f82e5fc91fe7f18cc095bb7ca7dd4c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Amadey
Vendor detections: 16
| SHA256 hash: | ec8ecd3eb6f6ae79021abf7d3edb357d4f82e5fc91fe7f18cc095bb7ca7dd4c6 |
|---|---|
| SHA3-384 hash: | 58cf692059c0618ec24a71ce4d7cbb7449a280e8b61819df87503c6ed526dcd07f32a59049af133485d012bf503b4078 |
| SHA1 hash: | d442d655d957031145c0b2ab5afa7b20c7760997 |
| MD5 hash: | f0b34b34b31d70584f8521a0113a7dd8 |
| humanhash: | apart-lemon-tennis-mirror |
| File name: | file |
| Download: | download sample |
| Signature | Amadey |
| File size: | 1'615'360 bytes |
| First seen: | 2023-10-24 15:59:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:oycZQu7RnEyh5YIFu3sFfEf/KpeV0kZqfzLBAEIhZFSU74Vg+OjJMDW:vcZ9ny+u8Ffs/KpY/ZqrOElUdI |
| Threatray | 2'354 similar samples on MalwareBazaar |
| TLSH | T1347533172BDA1577F8F9077048F509472F3EBDB44D7EC24B6A46A9190CA22D8283673B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | Amadey exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | mal_healer |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | Payload disabling Windows AV |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.