Skip Navigation
Get a Demo
 

Amber Albatross

The most prevalent threat we detected in 2025, Amber Albatross now masquerades as various PDF utilities as well as potentially unwanted programs like PC App Store.

#1

Overall Rank

11.1%

Customers Affected

Amber Albatross

The most prevalent threat we detected in 2025, Amber Albatross now masquerades as various PDF utilities as well as potentially unwanted programs like PC App Store.

#1

Overall Rank

11.1%

Customers Affected

Analysis

Amber Albatross is a Red Canary-named activity cluster that we have been tracking since January 2024. The activity encompasses download and installation activities that consistently lead to a Pyarmor-obfuscated PyInstaller executable with stealer-like capabilities. We have consistently observed Amber Albatross installers as a payload delivered by potentially unwanted programs (PUP), including Bit Guardian software, and PC App Store. In 2025, infections from PC App Store installers continued. We also saw additional infections from installers masquerading as PDF utilities.

The Amber Albatross intrusion chain contains multiple stages with anti-analysis techniques that make sandbox analysis difficult, and the final payload is heavily obfuscated. We assess that this activity is nefarious due to suspicious reconnaissance activity and its heavy obfuscation.

We first reported on Amber Albatross in our July 2024 Intelligence Insights.

The Amber Albatross intrusion chain contains multiple stages with anti-analysis techniques that make sandbox analysis difficult.

Intrusion chain

In 2025, installations from the potentially unwanted program PC App Store continued and we saw a small resurgence of installations through another PUP, Bit Guardian’s Win Riser. We also observed a revolving door of installer themes, mostly masquerading as PDF utilities. These installers, while signed, used a variety of different signers. The ever-changing signers and names of these utilities all performing the same reconnaissance and leading to the same Pyarmor-protected binary leads us to consider them more akin to masquerading malware than PUPs. Beyond the variable delivery mechanisms, Amber Albatross also updated some later stage TTPs—notably adding obfuscation through Base64-encoded PowerShell commands to download and execute later stage payloads, and migrating some of their second and third stage payloads from C++ to Go.

The installation activity also showed more variation this year. The installation path for the PC App Store variant, the most common initial access vector, remained the same. The PDFast lure was the second most common installation method, following a similar pattern to the “Let’s Compress” lure that began in late 2024. This variant dropped a binary named upd.exe leading to downloads and execution via Base64-encoded PowerShell commands.  The charts below walk through the installation paths used to deliver Amber Albatross’s PyInstaller executable for each program.

PC App Store

Amber Albatross execution chain from PC App Store

PDFast

The final payload

Regardless of the initial infection chain, the final Amber Albatross payload–the PyInstaller file—will immediately perform reconnaissance, similar to what we typically observe from stealers. During the reconnaissance phase, the malware will use WMIC to detect if there is a hypervisor present on the endpoint as well as enumerate the manufacturer, model, and list of Windows software updates. The PyInstaller file also checks for antivirus and firewall products, and based on analyzing memory dumps looks for a wide range of browsers and their development versions, including:

  • Edge
  • FireFox
  • Chrome
  • Chromium
  • Avast Browser
  • Brave

Once it identifies the browsers utilized on the endpoint, the PyInstaller EXE will attempt to access browser profiles or user data folders. For Chrome, we have seen Amber Albatross check the value of the following registry key:

HKLM:\SOFTWARE\Policies\Google\Chrome\CloudManagementEnrollmentToken

This key is set during enrollment for managed browsers, allowing Amber Albatross to determine if the browser might be controlled by corporate policy. We have yet to discern how Amber Albatross uses this information or continues the intrusion chain. However, these reconnaissance activities are typical for stealers.

In 2025, some variations added an additional reconnaissance step of querying the registry for software uninstall keys and compiling a list of software and versions installed on the machine.

Anti-analysis tactics

The downloaded Amber Albatross installation and PyInstaller files require specific command-line parameters in order to fully execute. We have consistently observed the arguments --safetorun and --channel=<hex numbers>. The numbers included in the --channel= flag vary by infection.

The requirement for command-line arguments has prevented behavioral analysis from showing the last-stage PyInstaller binary. For example, the PyInstaller files are rarely found on VirusTotal. This is because when the earlier-stage files are uploaded to VirusTotal, they do not have arguments passed with them to the sandbox engines.

Additionally, we do not observe the same behavior from the PC App Store installer in sandboxes as we do in live telemetry. This indicates there is some anti-sandbox analysis happening with the initial installer, making it difficult to observe the entire infection chain in a controlled environment.

The final-stage PyInstaller file that performs the reconnaissance activities is protected by Pyarmor, which encrypts and obfuscates the Python bytecode. This makes static analysis a challenging and time consuming endeavor.

Take action

One of the best ways to prevent threats like Amber Albatross from executing in your environment is to restrict third-party app stores like PC App Store. Red Canary classifies PC App Store as a PUP and detects it as such. While PUPs are a lower priority for many teams, restricting their use can prevent possible credential theft and the leaking of sensitive company data.

Detection opportunities

Amber Albatross uses a variety of  certificates to sign the first and second-stage installer files, which can be used for detection.

Certificates used by Amber Albatross in 2025

NameIssuerValid FromValid ToThumbprint
AL STARE LLCGlobalSign GCC R45 EV CodeSigning CA 20202024/04/092025/04/102defd4d6cbb10b7afd9b5a3dbd61e756549ee3cb
IBRAHIM MANNAN LLCGlobalSign GCC R45 EV CodeSigning CA 20202024/04/162025/04/175ad122b091c21eb546dfd20086d266e0e8429abf
UTILITY ACCESS (SMC-PRIVATE) LIMITEDGlobalSign GCC R45 EV CodeSigning CA 20202024/04/182025/04/19e6454be52b74dec4a3c5048a2398bc73d3e38176
UTILITY ACCESS (SMC-PRIVATE) LIMITEDGlobalSign GCC R45 EV CodeSigning CA 20202024/09/262025/09/2724097fb790d82fe390b9dcb3456675f96cef4b2b
THE-SHOP STOP LLCGlobalSign GCC R45 EV CodeSigning CA 20202024/10/022025/10/033acf161dc680cb52bdcf3227248e933de361bd48
SEELIV (SMC-PRIVATE) LIMITEDGlobalSign GCC R45 EV CodeSigning CA 20202024/10/092025/10/1077e3b1710323f25812a7af8d2a6a5c6a743dc25f
Called Sparkline LLCGlobalSign GCC R45 EV CodeSigning CA 20202024/12/202025/12/21b30f77a8bc06aada08b76e9176c3c15e7c9c49ff
VALUELYTIC AGRO PRIVATE LIMITEDGlobalSign GCC R45 CodeSigning CA 20202025/02/132026/02/14bc529da04d69ef981c4b1d3baba73177348e7ee4
DREAMVESSELS TECHNOLOGY PRIVATE LIMITEDGlobalSign GCC R45 CodeSigning CA 20202025/02/202026/02/21499e0e8f6d3c5c233a06d94fd476efda36248f50
KRZADROPSHIP PRIVATE LIMITEDGlobalSign GCC R45 CodeSigning CA 20202025/02/202026/02/216f62a79fa9d18994cbb569dbf9e4d87ee04e26f8
Fahad MalikSSL.com Code Signing Intermediate CA RSA R12025/04/092026/04/09632f7439652e088c95967b21ce88ede6e453899a

Amber Albatross’s command and control uses a variety of domains. Some are consistent across years while others are quickly rotated out. These occasionally relate to one of the delivery lures, but more often do not.

10 most recently observed domains contacted by Amber Albatross

  • field-for-ever[.]com
  • user[.]flypdfy[.]com
  • searcherfest[.]com
  • wellsearching[.]com
  • goaroundrio[.]com
  • dotspoint[.]com
  • searchresultfind[.]com
  • conf-file[.]com
  • searcherzone[.]com
  • searcherspot[.]com

Testing

Start testing your defenses against Amber Albatross using Atomic Red Team—an open source testing framework of small, highly portable detection tests mapped to MITRE ATT&CK.

Getting started

Amber Albatross exhibits behaviors represented by the following Atomic Red Team tests:

Review and repeat

Now that you have executed one or several common tests and checked for the expected results, it’s useful to answer some immediate questions:

  • Were any of your actions detected?
  • Were any of your actions blocked or prevented?
  • Were your actions visible in logs or other defensive telemetry?

Repeat this process, performing additional tests related to this technique. You can also create and contribute tests of your own.

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top