Threat name:
Amadey, Healer AV Disabler, LummaC Steal
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected PureLog Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1608570
Sample:
HEnpMb8iZs.exe
Startdate:
06/02/2025
Architecture:
WINDOWS
Score:
100
135
skirtgrippys.com
2->135
137
shunstriderk.net
2->137
139
41 other IPs or domains
2->139
169
Suricata IDS alerts
for network traffic
2->169
171
Found malware configuration
2->171
173
Antivirus detection
for URL or domain
2->173
175
31 other signatures
2->175
11
skotes.exe
6
44
2->11
started
16
HEnpMb8iZs.exe
2
2->16
started
18
e5c6333e32.exe
2->18
started
20
4 other processes
2->20
signatures3
process4
dnsIp5
141
185.215.113.43, 49983, 49984, 49986
WHOLESALECONNECTIONSNL
Portugal
11->141
143
185.215.113.97, 49990, 49995, 80
WHOLESALECONNECTIONSNL
Portugal
11->143
119
C:\Users\user\AppData\...\1ba064bba2.exe, PE32
11->119
dropped
121
C:\Users\user\AppData\...\23bac7308e.exe, PE32
11->121
dropped
123
C:\Users\user\AppData\...\5aa0b1cbd3.exe, PE32
11->123
dropped
131
11 other malicious files
11->131
dropped
231
Creates multiple autostart
registry keys
11->231
233
Hides threads from debuggers
11->233
235
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->235
237
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->237
22
e5c6333e32.exe
1
11->22
started
26
cmd.exe
11->26
started
28
a2a6946949.exe
11->28
started
39
2 other processes
11->39
145
185.215.113.16, 49804, 49985, 49987
WHOLESALECONNECTIONSNL
Portugal
16->145
147
ignoredshee.com
188.114.97.3, 443, 49722, 49728
CLOUDFLARENETUS
European Union
16->147
125
C:\Users\...2XRT3U0FPKZ2YOJCCAFX78PL774.exe, PE32
16->125
dropped
127
C:\Users\user\...\2SD0B9SI351ZFI5XERW.exe, PE32
16->127
dropped
239
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->239
241
Query firmware table
information (likely
to detect VMs)
16->241
243
Found many strings related
to Crypto-Wallets (likely
being stolen)
16->243
253
4 other signatures
16->253
30
2SD0B9SI351ZFI5XERW.exe
4
16->30
started
32
E2XRT3U0FPKZ2YOJCCAFX78PL774.exe
13
16->32
started
129
C:\Users\user\AppData\Local\...\ZMOhcIp49.hta, HTML
18->129
dropped
245
Binary is likely a compiled
AutoIt script file
18->245
247
Creates HTA files
18->247
35
mshta.exe
18->35
started
37
cmd.exe
18->37
started
249
Suspicious powershell
command line found
20->249
251
Tries to download and
execute files (via powershell)
20->251
41
4 other processes
20->41
file6
signatures7
process8
dnsIp9
113
C:\Users\user\AppData\Local\...\lxnwEXoXU.hta, HTML
22->113
dropped
185
Binary is likely a compiled
AutoIt script file
22->185
187
Machine Learning detection
for dropped file
22->187
189
Found API chain indicative
of sandbox detection
22->189
191
Creates HTA files
22->191
43
mshta.exe
1
22->43
started
46
cmd.exe
1
22->46
started
48
cmd.exe
26->48
started
51
conhost.exe
26->51
started
207
3 other signatures
28->207
115
C:\Users\user\AppData\Local\...\skotes.exe, PE32
30->115
dropped
193
Antivirus detection
for dropped file
30->193
195
Detected unpacking (changes
PE section rights)
30->195
197
Tries to evade debugger
and weak emulator (self
modifying code)
30->197
53
skotes.exe
30->53
started
133
185.215.113.115, 49842, 80
WHOLESALECONNECTIONSNL
Portugal
32->133
209
3 other signatures
32->209
199
Suspicious powershell
command line found
35->199
201
Tries to download and
execute files (via powershell)
35->201
55
powershell.exe
35->55
started
57
2 other processes
37->57
203
Multi AV Scanner detection
for dropped file
39->203
205
Injects a PE file into
a foreign processes
39->205
59
3 other processes
39->59
62
3 other processes
41->62
file10
signatures11
process12
dnsIp13
211
Suspicious powershell
command line found
43->211
213
Tries to download and
execute files (via powershell)
43->213
64
powershell.exe
43->64
started
215
Drops PE files with
a suspicious file extension
46->215
217
Uses schtasks.exe or
at.exe to add and modify
task schedules
46->217
78
2 other processes
46->78
103
C:\Temp\IzcAug8JS.hta, HTML
48->103
dropped
219
Creates HTA files
48->219
68
mshta.exe
48->68
started
70
cmd.exe
48->70
started
72
cmd.exe
48->72
started
80
4 other processes
48->80
221
Detected unpacking (changes
PE section rights)
53->221
223
Tries to evade debugger
and weak emulator (self
modifying code)
53->223
225
Hides threads from debuggers
53->225
229
2 other signatures
53->229
105
TempEZ8YWMGV8MVMKXL0YMQLS80I7JUYIFV1.EXE, PE32
55->105
dropped
74
conhost.exe
55->74
started
149
hopeefreamed.com
172.67.205.253
CLOUDFLARENETUS
United States
59->149
151
steamcommunity.com
23.197.127.21
AKAMAI-ASN1EU
United States
59->151
107
C:\Users\user\AppData\...\Macromedia.com, PE32
59->107
dropped
227
Tries to steal Crypto
Currency Wallets
59->227
76
Macromedia.com
59->76
started
82
11 other processes
59->82
file14
signatures15
process16
file17
109
Temp2NZKIR0Q6RFBRUVORXFUFROZDQ8ABRBH.EXE, PE32
64->109
dropped
153
Powershell drops PE
file
64->153
84
Temp2NZKIR0Q6RFBRUVORXFUFROZDQ8ABRBH.EXE
64->84
started
87
conhost.exe
64->87
started
155
Suspicious powershell
command line found
68->155
157
Tries to download and
execute files (via powershell)
68->157
89
powershell.exe
68->89
started
92
powershell.exe
70->92
started
94
powershell.exe
72->94
started
111
C:\Users\user\AppData\...\AchillesGuard.com, PE32
76->111
dropped
159
Drops PE files with
a suspicious file extension
76->159
96
powershell.exe
80->96
started
signatures18
process19
file20
177
Detected unpacking (changes
PE section rights)
84->177
179
Machine Learning detection
for dropped file
84->179
181
Modifies windows update
settings
84->181
183
7 other signatures
84->183
117
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
89->117
dropped
98
483d2fa8a0d53818306efeb32d3.exe
89->98
started
101
conhost.exe
89->101
started
signatures21
process22
signatures23
161
Antivirus detection
for dropped file
98->161
163
Detected unpacking (changes
PE section rights)
98->163
165
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
98->165
167
5 other signatures
98->167
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.