Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1673836
Sample:
BvcedLD5mF.exe
Startdate:
25/04/2025
Architecture:
WINDOWS
Score:
100
105
latitudert.live
2->105
107
equatorf.run
2->107
109
43 other IPs or domains
2->109
129
Suricata IDS alerts
for network traffic
2->129
131
Found malware configuration
2->131
133
Antivirus detection
for URL or domain
2->133
135
26 other signatures
2->135
10
saved.exe
3
37
2->10
started
15
BvcedLD5mF.exe
1
2->15
started
17
mshta.exe
2->17
started
19
5 other processes
2->19
signatures3
process4
dnsIp5
117
185.39.17.163, 49700, 49701, 49703
RU-TAGNET-ASRU
Russian Federation
10->117
91
C:\Users\user\AppData\...\655cc15cd5.exe, PE32
10->91
dropped
93
C:\Users\user\AppData\...\14cf0b0ed7.exe, PE32
10->93
dropped
95
C:\Users\user\AppData\...\4acbf41318.exe, PE32
10->95
dropped
101
11 other malicious files
10->101
dropped
181
Contains functionality
to start a terminal
service
10->181
183
Creates multiple autostart
registry keys
10->183
21
7c2cffd7cb.exe
9
1
10->21
started
24
a20ffb1122.exe
10->24
started
26
4acbf41318.exe
10->26
started
29
bd0ce79a3e.exe
10->29
started
119
185.39.17.162, 49688, 49702, 49704
RU-TAGNET-ASRU
Russian Federation
15->119
121
clarmodq.top
172.67.205.184, 443, 49681, 49682
CLOUDFLARENETUS
United States
15->121
97
C:\Users\...\02TKKUQOCRADPZTEY660NMCISHQU.exe, PE32
15->97
dropped
185
Detected unpacking (changes
PE section rights)
15->185
187
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->187
189
Query firmware table
information (likely
to detect VMs)
15->189
201
4 other signatures
15->201
31
02TKKUQOCRADPZTEY660NMCISHQU.exe
4
15->31
started
191
Suspicious powershell
command line found
17->191
193
Tries to download and
execute files (via powershell)
17->193
33
powershell.exe
17->33
started
99
C:\Users\user\AppData\Local\...\iEefVpyCg.hta, HTML
19->99
dropped
195
Creates HTA files
19->195
197
Hides threads from debuggers
19->197
199
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
19->199
35
firefox.exe
19->35
started
38
taskkill.exe
19->38
started
40
cmd.exe
19->40
started
file6
signatures7
process8
dnsIp9
137
Antivirus detection
for dropped file
21->137
139
Detected unpacking (changes
PE section rights)
21->139
141
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
21->141
161
9 other signatures
21->161
143
Multi AV Scanner detection
for dropped file
24->143
145
Writes to foreign memory
regions
24->145
147
Allocates memory in
foreign processes
24->147
149
Injects a PE file into
a foreign processes
24->149
42
MSBuild.exe
24->42
started
87
C:\Users\user\AppData\Local\...\csONIoIlk.hta, HTML
26->87
dropped
151
Binary is likely a compiled
AutoIt script file
26->151
153
Creates HTA files
26->153
46
mshta.exe
26->46
started
48
cmd.exe
26->48
started
155
Found API chain indicative
of sandbox detection
29->155
50
taskkill.exe
29->50
started
56
5 other processes
29->56
89
C:\Users\user\AppData\Local\...\saved.exe, PE32
31->89
dropped
157
Contains functionality
to start a terminal
service
31->157
159
Contains functionality
to inject code into
remote processes
31->159
52
saved.exe
31->52
started
58
2 other processes
33->58
111
youtube.com
142.250.69.14, 443, 49727, 49729
GOOGLEUS
United States
35->111
113
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82, 49728, 80
GOOGLEUS
United States
35->113
115
3 other IPs or domains
35->115
60
2 other processes
35->60
54
conhost.exe
38->54
started
file10
signatures11
process12
dnsIp13
123
climatologfy.top
104.21.112.1, 443, 49707, 49709
CLOUDFLARENETUS
United States
42->123
125
t.me
149.154.167.99, 443, 49705
TELEGRAMRU
United Kingdom
42->125
163
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
42->163
165
Query firmware table
information (likely
to detect VMs)
42->165
167
Tries to harvest and
steal ftp login credentials
42->167
179
3 other signatures
42->179
169
Suspicious powershell
command line found
46->169
171
Tries to download and
execute files (via powershell)
46->171
62
powershell.exe
46->62
started
173
Uses schtasks.exe or
at.exe to add and modify
task schedules
48->173
66
conhost.exe
48->66
started
68
schtasks.exe
48->68
started
70
conhost.exe
50->70
started
72
conhost.exe
50->72
started
175
Multi AV Scanner detection
for dropped file
52->175
177
Contains functionality
to start a terminal
service
52->177
74
conhost.exe
56->74
started
76
conhost.exe
56->76
started
78
conhost.exe
56->78
started
80
conhost.exe
56->80
started
signatures14
process15
file16
103
Temp1LKOO8RMHZMDQPFQDH22LKNPS8IL9D8V.EXE, PE32
62->103
dropped
203
Powershell drops PE
file
62->203
82
Temp1LKOO8RMHZMDQPFQDH22LKNPS8IL9D8V.EXE
62->82
started
85
conhost.exe
62->85
started
signatures17
process18
signatures19
127
Multi AV Scanner detection
for dropped file
82->127
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.