Amadey Loader

Malware updated 3 months ago (2024-06-18T21:17:37.202Z)
Download STIX
Preview STIX
Amadey Loader is a type of malware, a malicious software designed to infiltrate and damage computer systems. It can stealthily enter systems through suspicious downloads, emails, or websites, and once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. This particular malware was identified in a folder along with GuLoader shellcodes that load and decrypt payloads, despite claims from developers that Remcos and GuLoader are legitimate software. The evidence suggests that an individual or group known as Eminem has been implicated in the deployment of several types of malware, including Amadey Loader and Formbook. The latter is a notorious info stealer, used to extract sensitive information from infected systems. There's substantial proof indicating EMINэM’s involvement in the distribution of these harmful programs, demonstrating a comprehensive case against them. Proofpoint, a cybersecurity company, has observed at least five different types of malware being delivered using similar methods, which include Lumma Stealer, Amadey Loader, and JaskaGo. Lumma Stealer is another dangerous malware that was found to be spread through weaponized YouTube channels. Therefore, it's clear that the threat landscape is diverse and includes multiple vectors for infection, necessitating robust and comprehensive security measures.
Description last updated: 2024-06-18T21:17:09.036Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Amadey Loader Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
3 months ago
Cut & Paste Tactics Import Malware to Unwitting Victims
Checkpoint
a year ago
Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos - Check Point Research