Threat name:
Amadey, Clipboard Hijacker, MicroClip, R
Alert
Classification:
bank.troj.spyw.evad
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks if browser processes are running
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Drops PE files with benign system names
Early bird code injection technique detected
Found API chain indicative of debugger detection
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Clipboard Hijacker
Yara detected RHADAMANTHYS Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1802636
Sample:
Nexilo-CC-CheckerUpdated.exe
Startdate:
27/10/2025
Architecture:
WINDOWS
Score:
100
128
x.ns.gin.ntt.net
2->128
130
twc.trafficmanager.net
2->130
132
17 other IPs or domains
2->132
158
Suricata IDS alerts
for network traffic
2->158
160
Found malware configuration
2->160
162
Malicious sample detected
(through community Yara
rule)
2->162
164
20 other signatures
2->164
11
Nexilo-CC-CheckerUpdated.exe
6
2->11
started
15
ebecabcdbbbdc.exe
2->15
started
17
syshost.exe
2->17
started
19
5 other processes
2->19
signatures3
process4
file5
120
C:\Users\user\Desktop120exilo-CC-Checker.exe, PE32+
11->120
dropped
122
C:\Users\user\AppData\Roaming\vopni.exe, PE32+
11->122
dropped
124
C:\Users\user\AppData\Roaming\syshost.exe, PE32+
11->124
dropped
126
2 other malicious files
11->126
dropped
208
Contains functionality
to start a terminal
service
11->208
210
Drops PE files with
benign system names
11->210
21
sobxv.exe
2
2
11->21
started
25
Nexilo-CC-Checker.exe
11->25
started
27
syshost.exe
27
11->27
started
32
2 other processes
11->32
212
Found evasive API chain
(may stop execution
after checking mutex)
15->212
30
schtasks.exe
15->30
started
signatures6
process7
dnsIp8
98
C:\ProgramData\ebecabcdbbbdc.exe, PE32+
21->98
dropped
178
Found evasive API chain
(may stop execution
after checking mutex)
21->178
180
Creates autostart registry
keys with suspicious
names
21->180
182
Injects code into the
Windows Explorer (explorer.exe)
21->182
190
5 other signatures
21->190
34
explorer.exe
54
22
21->34
injected
39
schtasks.exe
21->39
started
41
schtasks.exe
21->41
started
100
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
25->100
dropped
102
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
25->102
dropped
104
C:\Users\user\AppData\Local\...\tk86t.dll, PE32+
25->104
dropped
112
26 other malicious files
25->112
dropped
184
Multi AV Scanner detection
for dropped file
25->184
186
Found pyInstaller with
non standard icon
25->186
43
Nexilo-CC-Checker.exe
25->43
started
150
158.94.208.102, 49682, 49684, 49685
JANETJiscServicesLimitedGB
United Kingdom
27->150
152
176.46.152.21, 49686, 49690, 49702
ESTPAKEE
Iran (ISLAMIC Republic Of)
27->152
154
178.16.53.7, 49681, 49683, 49692
DUSNET-ASDE
Germany
27->154
106
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
27->106
dropped
108
C:\Users\user\AppData\Local\Temp\...\zocp.exe, PE32
27->108
dropped
110
C:\Users\user\AppData\Local\...\Clipper.exe, PE32+
27->110
dropped
114
4 other malicious files
27->114
dropped
188
Contains functionality
to start a terminal
service
27->188
45
dropper64.exe
27->45
started
47
Stealc.exe
27->47
started
49
Clipper.exe
27->49
started
51
conhost.exe
30->51
started
file9
signatures10
process11
dnsIp12
134
176.46.152.46, 49687, 49688, 49693
ESTPAKEE
Iran (ISLAMIC Republic Of)
34->134
136
204.79.197.203, 443
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
34->136
90
C:\Users\user\AppData\Local\...07D.tmp.exe, PE32+
34->90
dropped
92
C:\Users\user\AppData\Local\...\CD4F.tmp.exe, PE32+
34->92
dropped
94
C:\Users\user\AppData\Local\...\B8E9.tmp.exe, PE32+
34->94
dropped
96
5 other malicious files
34->96
dropped
166
System process connects
to network (likely due
to code injection or
exploit)
34->166
168
Benign windows process
drops PE files
34->168
170
Found many strings related
to Crypto-Wallets (likely
being stolen)
34->170
176
2 other signatures
34->176
53
CD4F.tmp.exe
34->53
started
57
A59C.tmp.exe
34->57
started
60
E07D.tmp.exe
34->60
started
70
3 other processes
34->70
62
conhost.exe
39->62
started
64
conhost.exe
41->64
started
66
cmd.exe
43->66
started
68
elevation_service.exe
43->68
started
172
Multi AV Scanner detection
for dropped file
45->172
174
Found evasive API chain
(may stop execution
after checking mutex)
45->174
file13
signatures14
process15
dnsIp16
116
C:\Users\user\AppData\...\dropper64[1].exe, PE32+
53->116
dropped
118
C:\Users\user\AppData\...\1APEjzBjH5dq.exe, PE32+
53->118
dropped
192
Multi AV Scanner detection
for dropped file
53->192
194
Early bird code injection
technique detected
53->194
196
Found many strings related
to Crypto-Wallets (likely
being stolen)
53->196
204
9 other signatures
53->204
72
chrome.exe
53->72
started
74
chrome.exe
53->74
started
76
chrome.exe
53->76
started
144
time-a-g.nist.gov
129.6.15.28
US-NATIONAL-INSTITUTE-OF-STANDARDS-AND-TECHNOLOGYUS
United States
57->144
146
x.ns.gin.ntt.net
129.250.35.250
NTT-COMMUNICATIONS-2914US
United States
57->146
148
4 other IPs or domains
57->148
198
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
57->198
200
Tries to steal Mail
credentials (via file
/ registry access)
57->200
202
Tries to harvest and
steal ftp login credentials
57->202
206
3 other signatures
57->206
78
chrome.exe
57->78
started
81
chrome.exe
57->81
started
83
conhost.exe
66->83
started
file17
signatures18
process19
dnsIp20
156
192.168.2.7, 443, 49672, 49681
unknown
unknown
78->156
85
chrome.exe
78->85
started
88
chrome.exe
78->88
started
process21
dnsIp22
138
googlehosted.l.googleusercontent.com
142.250.69.161, 443, 49765
GOOGLEUS
United States
85->138
140
www.google.com
142.250.73.132, 443, 49771
GOOGLEUS
United States
85->140
142
3 other IPs or domains
85->142
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.