URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as AmateraStealer.

Database Entry


Signature:AmateraStealer
Firstseen:2025-02-07 18:27:25 UTC
Lastseen:2025-10-23 15:50:20 UTC
Unique Payloads:5
URLs:2

Payload


The table below shows all payloads that have been identified as AmateraStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2025-10-23 15:50:2052c5927204ea1f0c16fff1272b387a52e37f4f60dec0fc694874d53e27795fa4Executable exe868'352n/a
2025-10-22 17:05:432a162fb04ac142cfb0dfc517959162d69f71231648be34187d308dbc270770bfExecutable exe820'736n/a
2025-10-20 17:13:2962c73935a796b3a9564077c282221079d84a6f5938ac2106e594df36e35124a9Executable exe884'072n/a
2025-10-15 17:04:11d8e268a083b161162dd23587edcc5f11706fdc86973ce2807a4623183028a5d7Executable exe869'888n/a
2025-02-07 18:27:258013788d85354330064e9c2b72b07a67c85015c1e072671f19f1c39cebad64a3Executable exe21'785'160n/a

Number of entries displayed: 5 (max: 1'000)