Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad.mine
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1675427
Sample:
random.exe
Startdate:
27/04/2025
Architecture:
WINDOWS
Score:
100
99
zestmodp.top
2->99
101
youtube.com
2->101
103
53 other IPs or domains
2->103
135
Suricata IDS alerts
for network traffic
2->135
137
Found malware configuration
2->137
139
Antivirus detection
for URL or domain
2->139
141
27 other signatures
2->141
10
saved.exe
4
56
2->10
started
15
random.exe
1
2->15
started
17
1508515eb5.exe
2->17
started
19
5 other processes
2->19
signatures3
process4
dnsIp5
105
185.39.17.163, 49729, 49730, 49733
RU-TAGNET-ASRU
Russian Federation
10->105
107
185.215.113.30
WHOLESALECONNECTIONSNL
Portugal
10->107
85
C:\Users\user\AppData\...\5142a471ab.exe, PE32
10->85
dropped
87
C:\Users\user\AppData\...\3a00532a55.exe, PE32
10->87
dropped
89
C:\Users\user\AppData\Local\...\JLVnvnZ.exe, PE32+
10->89
dropped
95
21 other malicious files
10->95
dropped
189
Contains functionality
to start a terminal
service
10->189
191
Creates multiple autostart
registry keys
10->191
21
1508515eb5.exe
1
10->21
started
25
bd1117f9c6.exe
9
1
10->25
started
27
6755ea1dc8.exe
10->27
started
38
2 other processes
10->38
109
185.39.17.162, 49726, 49731, 49735
RU-TAGNET-ASRU
Russian Federation
15->109
111
clarmodq.top
172.67.205.184, 443, 49714, 49715
CLOUDFLARENETUS
United States
15->111
91
C:\Users\...\HAIBOFN1NMIZ54JH7BGYSH3HQ4RL.exe, PE32
15->91
dropped
193
Detected unpacking (changes
PE section rights)
15->193
195
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->195
197
Query firmware table
information (likely
to detect VMs)
15->197
211
2 other signatures
15->211
29
HAIBOFN1NMIZ54JH7BGYSH3HQ4RL.exe
4
15->29
started
93
C:\Users\...\TSZ2WY17Q0XLPWWCQKGON6SYP.exe, PE32
17->93
dropped
199
Tries to steal Crypto
Currency Wallets
17->199
201
Hides threads from debuggers
17->201
203
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->203
31
chrome.exe
17->31
started
34
chrome.exe
17->34
started
205
Suspicious powershell
command line found
19->205
207
Tries to download and
execute files (via powershell)
19->207
209
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->209
36
firefox.exe
19->36
started
40
2 other processes
19->40
file6
signatures7
process8
dnsIp9
79
C:\Users\...\FXLZAKIFBBJOE8OFR14HT9E88RI.exe, PE32
21->79
dropped
143
Antivirus detection
for dropped file
21->143
145
Detected unpacking (changes
PE section rights)
21->145
147
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
21->147
163
7 other signatures
21->163
42
FXLZAKIFBBJOE8OFR14HT9E88RI.exe
21->42
started
149
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
25->149
151
Modifies windows update
settings
25->151
165
3 other signatures
25->165
153
Multi AV Scanner detection
for dropped file
27->153
167
3 other signatures
27->167
45
MSBuild.exe
27->45
started
81
C:\Users\user\AppData\Local\...\saved.exe, PE32
29->81
dropped
155
Contains functionality
to start a terminal
service
29->155
157
Contains functionality
to inject code into
remote processes
29->157
48
saved.exe
29->48
started
127
192.168.2.4, 443, 49708, 49710
unknown
unknown
31->127
50
chrome.exe
31->50
started
52
chrome.exe
34->52
started
129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82, 49792, 80
GOOGLEUS
United States
36->129
131
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216, 443, 49760
GOOGLEUS
United States
36->131
133
127.0.0.1
unknown
unknown
36->133
56
2 other processes
36->56
83
C:\Users\user\AppData\Local\...\dcgH7UNvf.hta, HTML
38->83
dropped
159
Binary is likely a compiled
AutoIt script file
38->159
161
Creates HTA files
38->161
54
mshta.exe
38->54
started
58
7 other processes
38->58
60
2 other processes
40->60
file10
signatures11
process12
dnsIp13
113
t.me
149.154.167.99, 443, 49797
TELEGRAMRU
United Kingdom
45->113
115
techwaveg.run
104.21.58.253, 443, 49801
CLOUDFLARENETUS
United States
45->115
169
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
45->169
171
Query firmware table
information (likely
to detect VMs)
45->171
173
Tries to harvest and
steal ftp login credentials
45->173
185
3 other signatures
45->185
175
Multi AV Scanner detection
for dropped file
48->175
177
Contains functionality
to start a terminal
service
48->177
117
142.250.69.4, 443, 49765, 49766
GOOGLEUS
United States
50->117
119
142.250.72.132, 443, 49775, 49776
GOOGLEUS
United States
50->119
125
9 other IPs or domains
50->125
121
www.google.com
142.250.189.4, 443, 49750, 49751
GOOGLEUS
United States
52->121
123
youtube.com
192.178.49.174, 443, 49746, 49749
GOOGLEUS
United States
52->123
179
Suspicious powershell
command line found
54->179
181
Tries to download and
execute files (via powershell)
54->181
62
powershell.exe
54->62
started
183
Uses schtasks.exe or
at.exe to add and modify
task schedules
58->183
66
conhost.exe
58->66
started
68
conhost.exe
58->68
started
70
conhost.exe
58->70
started
72
4 other processes
58->72
signatures14
process15
file16
97
TempPGQ32XRZJDFQX5AOBKW8JWXRCDEHTLDO.EXE, PE32
62->97
dropped
213
Powershell drops PE
file
62->213
74
TempPGQ32XRZJDFQX5AOBKW8JWXRCDEHTLDO.EXE
62->74
started
77
conhost.exe
62->77
started
signatures17
process18
signatures19
187
Multi AV Scanner detection
for dropped file
74->187
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.