Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1674294
Sample:
random.exe
Startdate:
25/04/2025
Architecture:
WINDOWS
Score:
100
103
pastebin.com
2->103
105
owlflright.digital
2->105
107
54 other IPs or domains
2->107
127
Suricata IDS alerts
for network traffic
2->127
129
Found malware configuration
2->129
131
Antivirus detection
for URL or domain
2->131
135
27 other signatures
2->135
10
saved.exe
4
33
2->10
started
15
random.exe
1
2->15
started
17
c4c326c46a.exe
2->17
started
19
5 other processes
2->19
signatures3
133
Connects to a pastebin
service (likely for
C&C)
103->133
process4
dnsIp5
115
185.39.17.163, 49701, 49702, 49705
RU-TAGNET-ASRU
Russian Federation
10->115
89
C:\Users\user\AppData\...\010031ab87.exe, PE32
10->89
dropped
91
C:\Users\user\AppData\...\e817210aa6.exe, PE32
10->91
dropped
93
C:\Users\user\AppData\...\f64ea2e579.exe, PE32
10->93
dropped
99
9 other malicious files
10->99
dropped
181
Contains functionality
to start a terminal
service
10->181
183
Creates multiple autostart
registry keys
10->183
21
c4c326c46a.exe
1
10->21
started
25
b5224cb84e.exe
10->25
started
27
e817210aa6.exe
10->27
started
40
2 other processes
10->40
117
185.39.17.162, 49691, 49703, 49706
RU-TAGNET-ASRU
Russian Federation
15->117
119
clarmodq.top
172.67.205.184, 443, 49683, 49684
CLOUDFLARENETUS
United States
15->119
95
C:\Users\user\...\6AU0D7UM3G3OFX5XA129XEI.exe, PE32
15->95
dropped
185
Detected unpacking (changes
PE section rights)
15->185
187
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->187
189
Query firmware table
information (likely
to detect VMs)
15->189
203
4 other signatures
15->203
29
6AU0D7UM3G3OFX5XA129XEI.exe
4
15->29
started
97
C:\Users\user\...\8U7X5IZR2PQHCT1XQB.exe, PE32
17->97
dropped
191
Found many strings related
to Crypto-Wallets (likely
being stolen)
17->191
193
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->193
195
Tries to steal Crypto
Currency Wallets
17->195
31
chrome.exe
17->31
started
34
chrome.exe
17->34
started
197
Suspicious powershell
command line found
19->197
199
Tries to download and
execute files (via powershell)
19->199
201
Hides threads from debuggers
19->201
36
firefox.exe
19->36
started
38
powershell.exe
19->38
started
file6
signatures7
process8
dnsIp9
83
C:\Users\...\KL4P1M4C7GW40P7UNIA5559O.exe, PE32
21->83
dropped
137
Antivirus detection
for dropped file
21->137
139
Detected unpacking (changes
PE section rights)
21->139
141
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
21->141
157
10 other signatures
21->157
42
KL4P1M4C7GW40P7UNIA5559O.exe
21->42
started
143
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
25->143
159
4 other signatures
25->159
85
C:\Users\user\AppData\Local\...\LVahSaYyC.hta, HTML
27->85
dropped
145
Binary is likely a compiled
AutoIt script file
27->145
147
Creates HTA files
27->147
45
mshta.exe
27->45
started
47
cmd.exe
27->47
started
87
C:\Users\user\AppData\Local\...\saved.exe, PE32
29->87
dropped
149
Multi AV Scanner detection
for dropped file
29->149
151
Contains functionality
to start a terminal
service
29->151
153
Contains functionality
to inject code into
remote processes
29->153
49
saved.exe
29->49
started
121
192.168.2.9, 443, 49672, 49683
unknown
unknown
31->121
51
chrome.exe
34->51
started
123
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
GOOGLEUS
United States
36->123
125
127.0.0.1
unknown
unknown
36->125
54
firefox.exe
36->54
started
56
conhost.exe
38->56
started
155
Found API chain indicative
of sandbox detection
40->155
161
3 other signatures
40->161
58
MSBuild.exe
40->58
started
60
8 other processes
40->60
file10
signatures11
process12
dnsIp13
163
Suspicious powershell
command line found
45->163
165
Tries to download and
execute files (via powershell)
45->165
62
powershell.exe
45->62
started
167
Uses schtasks.exe or
at.exe to add and modify
task schedules
47->167
66
conhost.exe
47->66
started
68
schtasks.exe
47->68
started
169
Multi AV Scanner detection
for dropped file
49->169
171
Contains functionality
to start a terminal
service
49->171
109
www.google.com
142.250.69.4, 443, 49730, 49731
GOOGLEUS
United States
51->109
111
t.me
149.154.167.99, 443, 49707
TELEGRAMRU
United Kingdom
58->111
113
techwaveg.run
104.21.58.253, 443, 49708, 49709
CLOUDFLARENETUS
United States
58->113
173
Query firmware table
information (likely
to detect VMs)
58->173
175
Found many strings related
to Crypto-Wallets (likely
being stolen)
58->175
177
Tries to steal Crypto
Currency Wallets
58->177
179
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
60->179
70
conhost.exe
60->70
started
72
conhost.exe
60->72
started
74
conhost.exe
60->74
started
76
2 other processes
60->76
signatures14
process15
file16
101
TempYS8VUNT99MC2FOBROXTV2NFAS5OYZLRI.EXE, PE32
62->101
dropped
207
Contains functionality
to start a terminal
service
62->207
209
Found many strings related
to Crypto-Wallets (likely
being stolen)
62->209
211
Powershell drops PE
file
62->211
78
TempYS8VUNT99MC2FOBROXTV2NFAS5OYZLRI.EXE
62->78
started
81
conhost.exe
62->81
started
signatures17
process18
signatures19
205
Multi AV Scanner detection
for dropped file
78->205
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.