Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1676973
Sample:
random.exe
Startdate:
29/04/2025
Architecture:
WINDOWS
Score:
100
101
pastebin.com
2->101
103
woodpeckersd.run
2->103
105
17 other IPs or domains
2->105
129
Suricata IDS alerts
for network traffic
2->129
131
Found malware configuration
2->131
133
Antivirus detection
for URL or domain
2->133
137
25 other signatures
2->137
10
saved.exe
4
44
2->10
started
15
random.exe
1
2->15
started
17
8eb519df49.exe
2->17
started
19
5 other processes
2->19
signatures3
135
Connects to a pastebin
service (likely for
C&C)
101->135
process4
dnsIp5
121
185.39.17.163, 49965, 49966, 49969
RU-TAGNET-ASRU
Russian Federation
10->121
89
C:\Users\user\AppData\Local\...\AJ2naPd.exe, PE32+
10->89
dropped
91
C:\Users\user\AppData\Local\...\AJ2naPd.exe, PE32+
10->91
dropped
93
C:\Users\user\AppData\...\36ff51690e.exe, PE32
10->93
dropped
97
14 other malicious files
10->97
dropped
175
Contains functionality
to start a terminal
service
10->175
177
Creates multiple autostart
registry keys
10->177
21
8eb519df49.exe
1
10->21
started
26
fd0dae2502.exe
1
10->26
started
28
eebd6ab3bc.exe
10->28
started
40
2 other processes
10->40
123
185.39.17.162, 49867, 49967, 49971
RU-TAGNET-ASRU
Russian Federation
15->123
125
fishgh.digital
104.21.112.1, 443, 49698
CLOUDFLARENETUS
United States
15->125
127
5 other IPs or domains
15->127
95
C:\Users\user\...\7NUBT7QP3XS70S316K84X0.exe, PE32
15->95
dropped
179
Detected unpacking (changes
PE section rights)
15->179
181
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->181
183
Query firmware table
information (likely
to detect VMs)
15->183
199
5 other signatures
15->199
30
7NUBT7QP3XS70S316K84X0.exe
4
15->30
started
185
Found many strings related
to Crypto-Wallets (likely
being stolen)
17->185
187
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->187
189
Tries to steal Crypto
Currency Wallets
17->189
191
Tries to steal from
password manager
17->191
32
chrome.exe
17->32
started
34
chrome.exe
17->34
started
193
Multi AV Scanner detection
for dropped file
19->193
195
Suspicious powershell
command line found
19->195
197
Tries to download and
execute files (via powershell)
19->197
36
firefox.exe
19->36
started
38
powershell.exe
19->38
started
file6
signatures7
process8
dnsIp9
115
zenithcorde.top
172.67.190.162, 443, 49968, 49970
CLOUDFLARENETUS
United States
21->115
83
C:\Users\user\...\0SYQU372L2ZO2MQQJSTQI8.exe, PE32
21->83
dropped
139
Antivirus detection
for dropped file
21->139
141
Detected unpacking (changes
PE section rights)
21->141
143
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
21->143
159
8 other signatures
21->159
42
0SYQU372L2ZO2MQQJSTQI8.exe
21->42
started
145
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
26->145
147
Modifies windows update
settings
26->147
161
3 other signatures
26->161
85
C:\Users\user\AppData\Local\...\7xSA2JWjT.hta, HTML
28->85
dropped
149
Binary is likely a compiled
AutoIt script file
28->149
151
Creates HTA files
28->151
45
mshta.exe
28->45
started
47
cmd.exe
28->47
started
87
C:\Users\user\AppData\Local\...\saved.exe, PE32
30->87
dropped
153
Multi AV Scanner detection
for dropped file
30->153
155
Contains functionality
to start a terminal
service
30->155
157
Contains functionality
to inject code into
remote processes
30->157
49
saved.exe
30->49
started
117
192.168.2.8, 443, 49673, 49692
unknown
unknown
32->117
51
chrome.exe
32->51
started
54
chrome.exe
34->54
started
119
127.0.0.1
unknown
unknown
36->119
56
firefox.exe
36->56
started
58
conhost.exe
38->58
started
163
3 other signatures
40->163
60
6 other processes
40->60
file10
signatures11
process12
dnsIp13
165
Multi AV Scanner detection
for dropped file
42->165
167
Contains functionality
to start a terminal
service
42->167
169
Suspicious powershell
command line found
45->169
171
Tries to download and
execute files (via powershell)
45->171
62
powershell.exe
45->62
started
173
Uses schtasks.exe or
at.exe to add and modify
task schedules
47->173
66
conhost.exe
47->66
started
68
schtasks.exe
47->68
started
107
142.250.217.132
GOOGLEUS
United States
51->107
109
play.google.com
142.250.68.238
GOOGLEUS
United States
51->109
113
3 other IPs or domains
51->113
111
www.google.com
192.178.49.196
GOOGLEUS
United States
54->111
70
conhost.exe
60->70
started
72
conhost.exe
60->72
started
74
conhost.exe
60->74
started
76
2 other processes
60->76
signatures14
process15
file16
99
TempXVQSRJZZ8A6ETUGS1XDTSN7RXVADSE1C.EXE, PE32
62->99
dropped
203
Contains functionality
to start a terminal
service
62->203
205
Powershell drops PE
file
62->205
78
TempXVQSRJZZ8A6ETUGS1XDTSN7RXVADSE1C.EXE
62->78
started
81
conhost.exe
62->81
started
signatures17
process18
signatures19
201
Multi AV Scanner detection
for dropped file
78->201
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.