Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Amadey

20
Global rank
7
Month rank
8
Week rank
0
IOCs

Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.

Infostealer
Type
Likely ex-USSR
Origin
13 October, 2018
First seen
28 April, 2025
Last seen
Also known as
Amadey Bot

How to analyze Amadey with ANY.RUN

Infostealer
Type
Likely ex-USSR
Origin
13 October, 2018
First seen
28 April, 2025
Last seen

IOCs

IP addresses
95.86.21.52
213.6.54.58
201.119.15.212
45.155.7.60
109.73.242.14
187.140.86.116
187.134.87.130
5.42.78.22
95.154.196.56
181.230.206.248
189.143.158.99
183.100.39.157
190.219.153.101
179.43.155.195
79.137.205.112
104.47.53.36
193.106.175.148
187.204.8.141
201.124.98.97
60.246.82.1
Domains
catchddkxozvp.shop
potentioallykeos.shop
stagedchheiqwo.shop
declaredczxi.shop
conformfucdioz.shop
cagedwifedsozm.shop
interactiedovspm.shop
caffegclasiqwp.shop
contemplateodszsv.shop
replacedoxcjzp.shop
consciousourwi.shop
bindceasdiwozx.shop
deicedosmzj.shop
southedhiscuso.shop
traineiwnqo.shop
millyscroqwp.shop
evoliutwoqm.shop
charecteristicdxp.shop
wollfsoaisvz.shop
weiggheticulop.shop
URLs
http://185.39.17.122/som9unr/index.php
http://185.39.17.163/Su8kud7i/index.php
http://185.39.17.122/test/amnew.exe
http://185.215.113.30/som8unr/index.php
http://185.215.113.30/test/amnew.exe
http://185.39.17.241/0Bdh3sQpbD/index.php
http://185.215.113.59/Dy5h4kus/index.php
http://193.201.9.43/
http://176.113.115.6/Ni9kiput/index.php
http://77.91.68.18/nice/index.php
http://77.91.68.52/mac/index.php
http://147.45.47.70/tr8nomy/index.php
http://csgoprofind.net/gWmR5f2W/index.php
http://176.65.143.173/M0XmDru/index.php
http://185.215.113.43/Zu7JuNko/index.php
http://31.41.244.10/Dem7kTu/index.php
http://185.215.113.16/Jo89Ku7d/index.php
http://185.215.113.19/Vi9leo/index.php
http://185.81.68.156/jb87ejvjdsS/index.php
http://77.91.77.81/Kiru9gu/index.php
Last Seen at

Recent blog posts

post image
How Threat Intelligence Feeds Help During Inc...
watchers 705
comments 0
post image
PE32 Ransomware: A New Telegram-Based Threat...
watchers 3559
comments 0
post image
Seamlessly Integrate ANY.RUN’s Services into...
watchers 552
comments 0

What is Amadey malware

First seen about 5 years ago, Amadey is a modular bot that enables it to act as a loader or infostealer. It is designed to perform a range of malicious activities, including reconnaissance, data exfiltration, and loading additional payloads, which range from banking trojans to DDoS tools. It targets all versions of Microsoft Windows.

This malware’s capabilities include:

  • Privilege escalation
  • UAC bypassing
  • Keystroke logging
  • Screen capture
  • Downloading additional malware

While many adversaries primarily use this malware as a keylogger to steal credentials, it can also transform infected devices into spam email senders or add them to a botnet that adversaries use to launch DDoS attacks.

However, that’s not everything this threat is capable of. Owing to its modular design, Amadey can significantly expand its range of attack targets, enabling the extraction of a broader variety of information, such as files, login credentials, and cryptocurrency wallets.

Furthermore, current Amadey variants can recognize more than 14 antivirus solutions. This ability allows the malware to intelligently deploy a payload designed to evade the specific antivirus product installed on the compromised device.

In addition, this malware can move laterally, propagating to devices within the same network by pushing EternalBlue exploit onto victims. Although outdated, EternalBlue remains relevant, especially in public sectors like government and education, where end-of-life software usage is widespread.

As for the origin of this threat, little is known at this point. Older activity associated it with GandCrab campaigns, which might connect Amadey to the REvil gang or one of their affiliates. Additionally, Amadey is distributed on Slavic-speaking underground forums, which possibly places its origin in one of the ex-USSR territories.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

How to get more information from Amadey malware

In ANY.RUN, users can safely detonate Amadey samples and analyze it dynamically in a fully interactive cloud sandbox. Our service automatically collects and displays the execution data in user-friendly formats, such as this process graph.

Analyze malware for free in a fully interactive cloud sandbox – sign up now!

amadey Figure 1: A graph showing Amadey’s execution process

ANY.RUN detects Amadey using Suricata rules, allowing analysts to identify both new and old samples from this family. We also provide configuration details. This way, analysts can access important sample information like its version, options, and C2 addresses. The configuration is typically extracted within the first 10 seconds of launching a task. This ensures quick access to information.

amadey malware Figure 2: Amadey’s malware configuration

Amadey infostealer execution process

Once, when Amadey initiates its execution, the malware duplicates itself into a TEMP folder (sometimes naming itself bguuwe.exe). Following that, it modifies the Registry and creates a scheduled task to achieve persistence. Subsequently, Amadey sets up C2 communication and transmits a system profile to the adversary's server. While active, Amadey takes screenshots at regular intervals and stores them in the TEMP directory, ready to be transmitted to the C2 server with subsequent POST requests.

Amadey often serves as a loader for other malicious programs, such as in this task.

Also, Amadey has a very specific structure of POST requests, that can be used to identify it with a high degree of probability:

Figure 3: Information about infected machine, exfiltrated by Amadey and sent to C2 amadey malware

Distribution of Amadey

Amadey primarily relies on spear-phishing emails containing malicious attachments, such as Microsoft Office documents, to target specific organizations or individuals. The email content is carefully crafted to appear legitimate, enticing the victim to open the attachment.

Alternatively, Amadey can employ exploit kits (Fallout and Rig), drive-by downloads, or be dropped as a payload by other malware (in recent cases it was distributed by SmokeLoader).

Amadey malware conclusion

Amadey malware presents a notable challenge for cybersecurity researchers. Its persistence and evasion techniques, coupled with a highly customizable modular architecture, make it a high-level threat. Understanding its various infection vectors, exploitation methods, and malicious activities is essential to develop effective countermeasures and improve our overall cybersecurity posture.

You can efficiently detect and examine threats such as Amadey, with the help of ANY.RUN interactive sandbox, which provides analysis results in minutes.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla ist eine Spyware, die Informationen über die Aktionen ihrer Opfer sammelt, indem sie Tastatureingaben und Benutzerinteraktionen aufzeichnet. Sie wird auf der speziellen Website, auf der diese Malware verkauft wird, fälschlicherweise als legitime Software vermarktet.
Read More
GuLoader screenshot
GuLoader
guloader
GuLoader ist ein fortschrittlicher, in Shellcode geschriebener Downloader. Er wird von Kriminellen verwendet, um andere Malware, vor allem Trojaner, in großem Umfang zu verbreiten. Er ist dafür berüchtigt, dass er Anti-Erkennungs- und Anti-Analyse-Funktionen nutzt.
Read More
WannaCry screenshot
WannaCry
wannacry ransomware
WannaCry ist eine bekannte Ransomware, die die EternalBlue-Schwachstelle nutzt. Diese Malware ist dafür bekannt, dass sie mindestens 200.000 Computer weltweit infiziert hat, und sie ist weiterhin eine aktive und gefährliche Bedrohung.
Read More
XWorm screenshot
XWorm
xworm
XWorm ist ein Remote Access Trojaner (RAT), der als Malware-as-a-Service verkauft wird. Er verfügt über ein umfangreiches Hacking-Toolset und ist in der Lage, private Informationen und Dateien auf dem infizierten Computer zu sammeln, MetaMask- und Telegram-Konten zu kapern und Benutzeraktivitäten zu verfolgen. XWorm wird in der Regel durch mehrstufige Angriffe auf die Computer der Opfer übertragen, die mit Phishing-E-Mails beginnen.
Read More
Remcos screenshot
Remcos
remcos trojan rat stealer
Remcos ist eine Malware vom Typ RAT, mit der Angreifer aus der Ferne Aktionen auf infizierten Computern durchführen können. Diese Malware ist extrem aktiv und wird fast jeden Monat mit Updates auf den neuesten Stand gebracht.
Read More
LokiBot screenshot
LokiBot
lokibot loader trojan
LokiBot wurde im Jahr 2015 entwickelt, um Informationen aus einer Vielzahl von Anwendungen zu stehlen. Trotz ihres Alters ist diese Malware bei Cyberkriminellen immer noch recht beliebt.
Read More