Threat name:
Amadey, AsyncRAT, Healer AV Disabler, Lu
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected PureLog Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1608526
Sample:
H0gXadpzWD.exe
Startdate:
06/02/2025
Architecture:
WINDOWS
Score:
100
153
Found malware configuration
2->153
155
Malicious sample detected
(through community Yara
rule)
2->155
157
Antivirus detection
for URL or domain
2->157
159
28 other signatures
2->159
10
skotes.exe
6
106
2->10
started
15
H0gXadpzWD.exe
5
2->15
started
17
657b3c9f48.exe
2->17
started
19
4 other processes
2->19
process3
dnsIp4
131
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
10->131
133
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
10->133
135
185.215.113.97
WHOLESALECONNECTIONSNL
Portugal
10->135
105
C:\Users\user\AppData\...\ff3622a4a0.exe, PE32
10->105
dropped
107
C:\Users\user\AppData\...\b159b031ff.exe, PE32
10->107
dropped
109
C:\Users\user\AppData\...\5f9178654e.exe, PE32
10->109
dropped
117
34 other malicious files
10->117
dropped
205
Creates multiple autostart
registry keys
10->205
207
Hides threads from debuggers
10->207
209
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->209
21
657b3c9f48.exe
10->21
started
25
cmd.exe
10->25
started
27
50e5c8add4.exe
10->27
started
37
3 other processes
10->37
111
C:\Users\user\AppData\Local\...\skotes.exe, PE32
15->111
dropped
113
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
15->113
dropped
211
Detected unpacking (changes
PE section rights)
15->211
213
Tries to evade debugger
and weak emulator (self
modifying code)
15->213
215
Tries to detect virtualization
through RDTSC time measurements
15->215
29
skotes.exe
15->29
started
115
C:\Users\user\AppData\Local\...\iJY0ot7uG.hta, HTML
17->115
dropped
217
Binary is likely a compiled
AutoIt script file
17->217
219
Creates HTA files
17->219
31
mshta.exe
17->31
started
33
cmd.exe
17->33
started
221
Suspicious powershell
command line found
19->221
223
Tries to download and
execute files (via powershell)
19->223
225
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->225
35
powershell.exe
19->35
started
file5
signatures6
process7
file8
101
C:\Users\user\AppData\Local\...\JVMWkRICy.hta, HTML
21->101
dropped
161
Binary is likely a compiled
AutoIt script file
21->161
163
Found API chain indicative
of sandbox detection
21->163
165
Creates HTA files
21->165
39
mshta.exe
21->39
started
42
cmd.exe
21->42
started
44
cmd.exe
25->44
started
47
conhost.exe
25->47
started
167
Multi AV Scanner detection
for dropped file
27->167
169
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
27->169
171
Injects a PE file into
a foreign processes
27->171
49
50e5c8add4.exe
27->49
started
173
Detected unpacking (changes
PE section rights)
29->173
185
4 other signatures
29->185
175
Suspicious powershell
command line found
31->175
177
Tries to download and
execute files (via powershell)
31->177
51
powershell.exe
31->51
started
55
2 other processes
33->55
53
conhost.exe
35->53
started
179
Found many strings related
to Crypto-Wallets (likely
being stolen)
37->179
181
Contains functionality
to inject code into
remote processes
37->181
183
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
37->183
57
8 other processes
37->57
signatures9
process10
dnsIp11
187
Suspicious powershell
command line found
39->187
189
Tries to download and
execute files (via powershell)
39->189
60
powershell.exe
39->60
started
191
Uses schtasks.exe or
at.exe to add and modify
task schedules
42->191
64
conhost.exe
42->64
started
66
schtasks.exe
42->66
started
119
C:\Temp\SPKv5Uk3N.hta, HTML
44->119
dropped
193
Creates HTA files
44->193
68
mshta.exe
44->68
started
70
cmd.exe
44->70
started
72
cmd.exe
44->72
started
78
4 other processes
44->78
195
Query firmware table
information (likely
to detect VMs)
49->195
197
Tries to harvest and
steal ftp login credentials
49->197
199
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->199
121
TempYBRQTFMNLMWDA8MYJXGY5C4WJH6NCGTD.EXE, PE32
51->121
dropped
74
conhost.exe
51->74
started
76
Conhost.exe
55->76
started
125
95.216.115.242
HETZNER-ASDE
Germany
57->125
127
127.0.0.1
unknown
unknown
57->127
129
3 other IPs or domains
57->129
201
Found many strings related
to Crypto-Wallets (likely
being stolen)
57->201
203
Tries to steal Crypto
Currency Wallets
57->203
file12
signatures13
process14
file15
123
TempFAX02ZFW5KAIPGHQ443E6PJ2GPLWSYG9.EXE, PE32
60->123
dropped
227
Powershell drops PE
file
60->227
80
TempFAX02ZFW5KAIPGHQ443E6PJ2GPLWSYG9.EXE
60->80
started
83
conhost.exe
60->83
started
229
Suspicious powershell
command line found
68->229
231
Tries to download and
execute files (via powershell)
68->231
85
powershell.exe
68->85
started
88
powershell.exe
70->88
started
90
powershell.exe
72->90
started
92
powershell.exe
78->92
started
signatures16
process17
file18
137
Detected unpacking (changes
PE section rights)
80->137
139
Machine Learning detection
for dropped file
80->139
141
Modifies windows update
settings
80->141
143
7 other signatures
80->143
94
Conhost.exe
80->94
started
103
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
85->103
dropped
96
483d2fa8a0d53818306efeb32d3.exe
85->96
started
99
conhost.exe
85->99
started
signatures19
process20
signatures21
145
Multi AV Scanner detection
for dropped file
96->145
147
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
96->147
149
Tries to evade debugger
and weak emulator (self
modifying code)
96->149
151
3 other signatures
96->151
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.