Threat name:
Amadey, GCleaner, Healer AV Disabler, Ke, LummaC Stealer, Stealc
Alert
Classification:
phis.troj.spyw.expl.evad
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected BrowserPasswordDump
Yara detected Generic Downloader
Yara detected Healer AV Disabler
Yara detected Keylogger Generic
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected StormKitty Stealer
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1608232
Sample:
c3QebhWPbe.exe
Startdate:
06/02/2025
Architecture:
WINDOWS
Score:
100
136
www.youtube.com
2->136
138
www.wikipedia.org
2->138
140
38 other IPs or domains
2->140
176
Suricata IDS alerts
for network traffic
2->176
178
Found malware configuration
2->178
180
Malicious sample detected
(through community Yara
rule)
2->180
182
34 other signatures
2->182
11
skotes.exe
5
52
2->11
started
16
c3QebhWPbe.exe
2
2->16
started
18
55be820a31.exe
2->18
started
20
8 other processes
2->20
signatures3
process4
dnsIp5
152
185.215.113.43, 49986, 49987, 49989
WHOLESALECONNECTIONSNL
Portugal
11->152
154
185.215.113.97, 49988, 49996, 80
WHOLESALECONNECTIONSNL
Portugal
11->154
118
C:\Users\user\AppData\...\52c54b83e3.exe, PE32
11->118
dropped
120
C:\Users\user\AppData\...\3527a7842a.exe, PE32
11->120
dropped
122
C:\Users\user\AppData\...\36f1596111.exe, PE32
11->122
dropped
132
17 other malicious files
11->132
dropped
240
Creates multiple autostart
registry keys
11->240
242
Hides threads from debuggers
11->242
260
2 other signatures
11->260
22
55be820a31.exe
11->22
started
26
08ef32c4ac.exe
11->26
started
29
cmd.exe
11->29
started
39
4 other processes
11->39
156
185.215.113.16, 49831, 49990, 49991
WHOLESALECONNECTIONSNL
Portugal
16->156
158
ignoredshee.com
188.114.96.3, 443, 49742, 49753
CLOUDFLARENETUS
European Union
16->158
124
C:\...\HMCGGXKASOJARULJAR3L4XNI3AQ2HHW.exe, PE32
16->124
dropped
126
C:\Users\...VWVGUTLJTROUD3MLM5OZAU0.exe, PE32
16->126
dropped
244
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->244
246
Query firmware table
information (likely
to detect VMs)
16->246
248
Found many strings related
to Crypto-Wallets (likely
being stolen)
16->248
262
3 other signatures
16->262
31
HMCGGXKASOJARULJAR3L4XNI3AQ2HHW.exe
4
16->31
started
33
EVWVGUTLJTROUD3MLM5OZAU0.exe
13
16->33
started
128
C:\Users\user\AppData\Local\...\KEl3KwO4C.hta, HTML
18->128
dropped
250
Binary is likely a compiled
AutoIt script file
18->250
252
Creates HTA files
18->252
35
mshta.exe
18->35
started
37
cmd.exe
18->37
started
160
85.209.128.208, 4449, 49994
VELIANET-ASvelianetInternetdiensteGmbHDE
Netherlands
20->160
130
C:\Users\user\AppData\Local\...\4E9DoqCrB.hta, HTML
20->130
dropped
254
Multi AV Scanner detection
for dropped file
20->254
256
Detected unpacking (changes
PE section rights)
20->256
258
Suspicious powershell
command line found
20->258
264
2 other signatures
20->264
41
7 other processes
20->41
file6
signatures7
process8
dnsIp9
108
C:\Users\user\AppData\Local\...\kMbAHZVcj.hta, HTML
22->108
dropped
200
Binary is likely a compiled
AutoIt script file
22->200
216
2 other signatures
22->216
43
mshta.exe
22->43
started
46
cmd.exe
22->46
started
142
rampnatleadk.click
172.67.139.144
CLOUDFLARENETUS
United States
26->142
202
Antivirus detection
for dropped file
26->202
204
Detected unpacking (changes
PE section rights)
26->204
206
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
26->206
218
4 other signatures
26->218
48
cmd.exe
29->48
started
51
conhost.exe
29->51
started
110
C:\Users\user\AppData\Local\...\skotes.exe, PE32
31->110
dropped
208
Multi AV Scanner detection
for dropped file
31->208
220
2 other signatures
31->220
53
skotes.exe
31->53
started
144
185.215.113.115, 49883, 80
WHOLESALECONNECTIONSNL
Portugal
33->144
222
3 other signatures
33->222
210
Suspicious powershell
command line found
35->210
212
Tries to download and
execute files (via powershell)
35->212
55
powershell.exe
35->55
started
57
2 other processes
37->57
146
37.27.182.109
UNINETAZ
Iran (ISLAMIC Republic Of)
39->146
148
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
39->148
150
3 other IPs or domains
39->150
112
C:\Users\user\AppData\Roaming\Wihnup.exe, PE32
39->112
dropped
224
4 other signatures
39->224
59
2 other processes
39->59
114
C:\TempbehaviorgraphMK47LirH.hta, HTML
41->114
dropped
214
Creates HTA files
41->214
61
10 other processes
41->61
file10
signatures11
process12
file13
226
Suspicious powershell
command line found
43->226
228
Tries to download and
execute files (via powershell)
43->228
63
powershell.exe
43->63
started
73
2 other processes
46->73
104
C:\Temp\LErIWPUDo.hta, HTML
48->104
dropped
230
Creates HTA files
48->230
67
mshta.exe
48->67
started
69
cmd.exe
48->69
started
75
5 other processes
48->75
232
Hides threads from debuggers
53->232
234
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
53->234
236
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
53->236
106
TempIOYANSOM8RORAGWTIU4XP63SQY7QLEPB.EXE, PE32
55->106
dropped
71
TempIOYANSOM8RORAGWTIU4XP63SQY7QLEPB.EXE
55->71
started
77
2 other processes
55->77
238
Uses schtasks.exe or
at.exe to add and modify
task schedules
59->238
79
5 other processes
59->79
81
4 other processes
61->81
signatures14
process15
file16
134
TempNQR45PNJNC8OBP4U5KIQ9PZUJLTJ1RAZ.EXE, PE32
63->134
dropped
162
Powershell drops PE
file
63->162
83
TempNQR45PNJNC8OBP4U5KIQ9PZUJLTJ1RAZ.EXE
63->83
started
86
conhost.exe
63->86
started
164
Suspicious powershell
command line found
67->164
166
Tries to download and
execute files (via powershell)
67->166
88
powershell.exe
67->88
started
91
powershell.exe
69->91
started
168
Multi AV Scanner detection
for dropped file
71->168
170
Detected unpacking (changes
PE section rights)
71->170
172
Machine Learning detection
for dropped file
71->172
174
5 other signatures
71->174
93
powershell.exe
75->93
started
95
powershell.exe
75->95
started
97
conhost.exe
81->97
started
signatures17
process18
file19
184
Multi AV Scanner detection
for dropped file
83->184
186
Detected unpacking (changes
PE section rights)
83->186
188
Machine Learning detection
for dropped file
83->188
190
8 other signatures
83->190
116
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
88->116
dropped
99
483d2fa8a0d53818306efeb32d3.exe
88->99
started
102
conhost.exe
88->102
started
signatures20
process21
signatures22
192
Multi AV Scanner detection
for dropped file
99->192
194
Detected unpacking (changes
PE section rights)
99->194
196
Tries to evade debugger
and weak emulator (self
modifying code)
99->196
198
3 other signatures
99->198
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.