Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1675404
Sample:
random.exe
Startdate:
27/04/2025
Architecture:
WINDOWS
Score:
100
108
www.google.com
2->108
110
play.google.com
2->110
112
2 other IPs or domains
2->112
130
Suricata IDS alerts
for network traffic
2->130
132
Found malware configuration
2->132
134
Antivirus detection
for URL or domain
2->134
136
24 other signatures
2->136
12
random.exe
1
2->12
started
17
23a21b1f6c.exe
2->17
started
19
d723d03d8b.exe
2->19
started
21
7 other processes
2->21
signatures3
process4
dnsIp5
126
185.39.17.162, 49697, 49764, 49767
RU-TAGNET-ASRU
Russian Federation
12->126
128
clarmodq.top
104.21.85.126, 443, 49687, 49688
CLOUDFLARENETUS
United States
12->128
104
C:\...\2STT93JV3SHOOY9VDJTZ408HANUBAJ.exe, PE32
12->104
dropped
184
Detected unpacking (changes
PE section rights)
12->184
186
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
12->186
188
Query firmware table
information (likely
to detect VMs)
12->188
206
3 other signatures
12->206
23
2STT93JV3SHOOY9VDJTZ408HANUBAJ.exe
4
12->23
started
106
C:\Users\user\...\D3V0NYM400UL7VL3.exe, PE32
17->106
dropped
190
Found many strings related
to Crypto-Wallets (likely
being stolen)
17->190
192
Tries to harvest and
steal ftp login credentials
17->192
194
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->194
196
Tries to steal from
password manager
17->196
27
chrome.exe
17->27
started
30
chrome.exe
17->30
started
198
Hides threads from debuggers
19->198
200
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
19->200
202
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->202
204
Contains functionality
to start a terminal
service
21->204
32
firefox.exe
21->32
started
file6
signatures7
process8
dnsIp9
98
C:\Users\user\AppData\Local\...\saved.exe, PE32
23->98
dropped
156
Multi AV Scanner detection
for dropped file
23->156
158
Contains functionality
to start a terminal
service
23->158
160
Contains functionality
to inject code into
remote processes
23->160
34
saved.exe
4
25
23->34
started
122
192.168.2.6, 138, 443, 49199
unknown
unknown
27->122
39
chrome.exe
27->39
started
124
127.0.0.1
unknown
unknown
32->124
162
Found many strings related
to Crypto-Wallets (likely
being stolen)
32->162
41
firefox.exe
32->41
started
file10
signatures11
process12
dnsIp13
114
185.39.17.163, 49699, 49700, 49701
RU-TAGNET-ASRU
Russian Federation
34->114
88
C:\Users\user\AppData\...\55ea4b8f69.exe, PE32
34->88
dropped
90
C:\Users\user\AppData\...\e85647a9da.exe, PE32
34->90
dropped
92
C:\Users\user\AppData\...\d723d03d8b.exe, PE32
34->92
dropped
94
5 other malicious files
34->94
dropped
138
Multi AV Scanner detection
for dropped file
34->138
140
Contains functionality
to start a terminal
service
34->140
142
Creates multiple autostart
registry keys
34->142
43
23a21b1f6c.exe
1
34->43
started
47
d723d03d8b.exe
9
1
34->47
started
49
55ea4b8f69.exe
34->49
started
51
e85647a9da.exe
34->51
started
116
ogads-pa.clients6.google.com
142.250.188.234, 443, 49805, 49810
GOOGLEUS
United States
39->116
118
www.google.com
142.250.189.4, 443, 49784, 49785
GOOGLEUS
United States
39->118
120
3 other IPs or domains
39->120
file14
signatures15
process16
file17
100
C:\Users\...\37K4XQHJ7GQ35OTHPM3DXU15.exe, PE32
43->100
dropped
164
Antivirus detection
for dropped file
43->164
166
Multi AV Scanner detection
for dropped file
43->166
168
Detected unpacking (changes
PE section rights)
43->168
180
9 other signatures
43->180
53
37K4XQHJ7GQ35OTHPM3DXU15.exe
43->53
started
170
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
47->170
172
Modifies windows update
settings
47->172
174
Disables Windows Defender
Tamper protection
47->174
182
2 other signatures
47->182
102
C:\Users\user\AppData\Local\...\12cOFzk6M.hta, HTML
49->102
dropped
176
Binary is likely a compiled
AutoIt script file
49->176
178
Creates HTA files
49->178
56
mshta.exe
49->56
started
58
cmd.exe
49->58
started
60
taskkill.exe
51->60
started
62
taskkill.exe
51->62
started
64
taskkill.exe
51->64
started
66
3 other processes
51->66
signatures18
process19
signatures20
144
Multi AV Scanner detection
for dropped file
53->144
146
Contains functionality
to start a terminal
service
53->146
148
Suspicious powershell
command line found
56->148
150
Tries to download and
execute files (via powershell)
56->150
68
powershell.exe
56->68
started
152
Uses schtasks.exe or
at.exe to add and modify
task schedules
58->152
72
conhost.exe
58->72
started
74
schtasks.exe
58->74
started
76
conhost.exe
60->76
started
78
conhost.exe
62->78
started
80
conhost.exe
64->80
started
82
conhost.exe
66->82
started
84
conhost.exe
66->84
started
process21
file22
96
TempX8GMGVAKGC39D2JJ4MDFVZN9FODVKMZP.EXE, PE32
68->96
dropped
154
Powershell drops PE
file
68->154
86
conhost.exe
68->86
started
signatures23
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.