Threat name:
Amadey, Credential Flusher, Cryptbot, GC
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Leaks process information
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1604972
Sample:
KFkv0LwVHW.exe
Startdate:
02/02/2025
Architecture:
WINDOWS
Score:
100
123
warlikedbeliev.org
2->123
125
toppyneedus.biz
2->125
127
14 other IPs or domains
2->127
153
Suricata IDS alerts
for network traffic
2->153
155
Found malware configuration
2->155
157
Malicious sample detected
(through community Yara
rule)
2->157
159
33 other signatures
2->159
10
skotes.exe
2->10
started
15
axplong.exe
2
25
2->15
started
17
KFkv0LwVHW.exe
5
2->17
started
19
10 other processes
2->19
signatures3
process4
dnsIp5
143
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
10->143
99
C:\Users\user\AppData\...\d3b16e40e4.exe, PE32
10->99
dropped
101
C:\Users\user\AppData\...\f0278377ff.exe, PE32
10->101
dropped
103
C:\Users\user\AppData\...\4d9916a973.exe, PE32
10->103
dropped
113
28 other malicious files
10->113
dropped
187
Creates multiple autostart
registry keys
10->187
189
Hides threads from debuggers
10->189
191
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->191
21
e4323d8558.exe
10->21
started
25
9bc6778542.exe
10->25
started
28
a24bd1082e.exe
10->28
started
36
5 other processes
10->36
145
185.215.113.16, 49922, 49945, 49972
WHOLESALECONNECTIONSNL
Portugal
15->145
147
185.215.113.97, 49978, 49984, 80
WHOLESALECONNECTIONSNL
Portugal
15->147
115
8 other malicious files
15->115
dropped
193
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
15->193
30
2a3e84a2ec.exe
4
15->30
started
32
27475e468a.exe
33
15->32
started
38
2 other processes
15->38
105
C:\Users\user\AppData\Local\...\axplong.exe, PE32
17->105
dropped
107
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
17->107
dropped
195
Detected unpacking (changes
PE section rights)
17->195
197
Tries to evade debugger
and weak emulator (self
modifying code)
17->197
199
Tries to detect virtualization
through RDTSC time measurements
17->199
34
axplong.exe
17->34
started
109
C:\...\DU3TVEIHVRHEDLB0NTESC57389BPIF9.exe, PE32
19->109
dropped
111
C:\Users\user\...\4J5KRONE3M1AJJTP8HTDO.exe, PE32
19->111
dropped
201
Query firmware table
information (likely
to detect VMs)
19->201
203
Tries to harvest and
steal ftp login credentials
19->203
205
Tries to harvest and
steal browser information
(history, passwords,
etc)
19->205
207
Tries to steal Crypto
Currency Wallets
19->207
40
4 other processes
19->40
file6
signatures7
process8
dnsIp9
73
C:\Users\user\AppData\...\e4323d8558.tmp, PE32
21->73
dropped
161
Multi AV Scanner detection
for dropped file
21->161
42
e4323d8558.tmp
21->42
started
129
warlikedbeliev.org
104.21.18.116
CLOUDFLARENETUS
United States
25->129
75
C:\Users\user\...behaviorgraphE7YPAOBJLRKN0DJDNJ.exe, PE32
25->75
dropped
77
C:\Users\user\...\8Y01EPM8H5KIW2R9.exe, PE32
25->77
dropped
163
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
25->163
165
Query firmware table
information (likely
to detect VMs)
25->165
167
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
25->167
131
rampnatleadk.click
172.67.139.144
CLOUDFLARENETUS
United States
28->131
169
Found many strings related
to Crypto-Wallets (likely
being stolen)
28->169
185
2 other signatures
28->185
79
C:\Users\user\AppData\Local\...\skotes.exe, PE32
30->79
dropped
171
Detected unpacking (changes
PE section rights)
30->171
173
Tries to evade debugger
and weak emulator (self
modifying code)
30->173
175
Hides threads from debuggers
30->175
45
skotes.exe
30->45
started
133
185.156.73.23
RELDAS-NETRU
Russian Federation
32->133
81
C:\Users\user\AppData\Local\...\Y-Cleaner.exe, PE32
32->81
dropped
83
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
32->83
dropped
89
2 other malicious files
32->89
dropped
177
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
32->177
48
WerFault.exe
32->48
started
141
3 other IPs or domains
36->141
85
C:\Users\user\AppData\Local\Temp\tmp35.tmp, PE32
36->85
dropped
87
C:\Users\user\AppData\Local\...\D1qmXCVsm.hta, HTML
36->87
dropped
179
Binary is likely a compiled
AutoIt script file
36->179
181
Creates HTA files
36->181
50
mshta.exe
36->50
started
52
cmd.exe
36->52
started
54
taskkill.exe
36->54
started
56
conhost.exe
36->56
started
135
185.215.113.115, 49966, 80
WHOLESALECONNECTIONSNL
Portugal
38->135
137
home.fivegg5th.top
94.156.102.240
NETERRA-ASBG
Bulgaria
38->137
139
httpbin.org
54.196.242.26
AMAZON-AESUS
United States
38->139
183
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
38->183
file10
signatures11
process12
file13
91
C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32
42->91
dropped
93
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
42->93
dropped
95
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
42->95
dropped
97
21 other malicious files
42->97
dropped
58
flv2aviconverter.exe
42->58
started
209
Detected unpacking (changes
PE section rights)
45->209
211
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
45->211
213
Tries to evade debugger
and weak emulator (self
modifying code)
45->213
221
3 other signatures
45->221
215
Suspicious powershell
command line found
50->215
217
Tries to download and
execute files (via powershell)
50->217
62
powershell.exe
50->62
started
219
Uses schtasks.exe or
at.exe to add and modify
task schedules
52->219
65
conhost.exe
52->65
started
67
schtasks.exe
52->67
started
69
conhost.exe
54->69
started
signatures14
process15
dnsIp16
149
176.113.115.96
SELECTELRU
Russian Federation
58->149
151
193.176.153.180
AGROSVITUA
unknown
58->151
117
C:\ProgramData\Flv2AVIConverter\sqlite3.dll, PE32
58->117
dropped
119
C:\ProgramData\...\Flv2AVIConverter.exe, PE32
58->119
dropped
121
TempRNECXJCADFF4HJ2PDV4URQNPVQ9HUNTG.EXE, PE32
62->121
dropped
223
Powershell drops PE
file
62->223
71
conhost.exe
62->71
started
file17
signatures18
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.