Threat name:
Amadey, Credential Flusher, Cryptbot, Lu
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Leaks process information
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1611839
Sample:
px4Y74kUj2.exe
Startdate:
11/02/2025
Architecture:
WINDOWS
Score:
100
129
youtube.com
2->129
131
rebeldettern.com
2->131
133
5 other IPs or domains
2->133
175
Suricata IDS alerts
for network traffic
2->175
177
Found malware configuration
2->177
179
Antivirus detection
for URL or domain
2->179
181
33 other signatures
2->181
10
skotes.exe
2->10
started
15
px4Y74kUj2.exe
1
2->15
started
17
df1dfa8044.exe
2->17
started
19
7 other processes
2->19
signatures3
process4
dnsIp5
155
185.215.113.43, 49986, 49987, 49992
WHOLESALECONNECTIONSNL
Portugal
10->155
157
185.215.113.75, 49988, 80
WHOLESALECONNECTIONSNL
Portugal
10->157
109
C:\Users\user\AppData\Local\...\Bjkm5hE.exe, PE32
10->109
dropped
111
C:\Users\user\AppData\Local\...\KUQRYpJ.exe, PE32+
10->111
dropped
113
C:\Users\user\AppData\...\a0be961972.exe, PE32
10->113
dropped
121
21 other malicious files
10->121
dropped
239
Creates multiple autostart
registry keys
10->239
241
Hides threads from debuggers
10->241
243
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->243
21
d04aa34f51.exe
10->21
started
26
df1dfa8044.exe
10->26
started
28
22a0986bef.exe
10->28
started
40
3 other processes
10->40
115
C:\Users\user\AppData\Local\...\yH08AR1uj.hta, HTML
15->115
dropped
245
Binary is likely a compiled
AutoIt script file
15->245
247
Found API chain indicative
of sandbox detection
15->247
249
Creates HTA files
15->249
30
mshta.exe
1
15->30
started
32
cmd.exe
1
15->32
started
117
C:\...\TG67OTJ18BVHVRMCFQ98FSDHWCPRENC.exe, PE32
17->117
dropped
119
C:\Users\...\BYDYGQX1ICXGMYWQ53H5H6EE1S.exe, PE32
17->119
dropped
251
Query firmware table
information (likely
to detect VMs)
17->251
253
Tries to harvest and
steal ftp login credentials
17->253
255
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->255
257
Tries to steal Crypto
Currency Wallets
17->257
159
127.0.0.1
unknown
unknown
19->159
259
Suspicious powershell
command line found
19->259
261
Tries to download and
execute files (via powershell)
19->261
263
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->263
34
powershell.exe
16
19->34
started
36
firefox.exe
19->36
started
38
powershell.exe
19->38
started
file6
signatures7
process8
dnsIp9
135
185.215.113.115
WHOLESALECONNECTIONSNL
Portugal
21->135
91
C:\Users\user\AppData\...\vcruntime140[1].dll, PE32
21->91
dropped
93
C:\Users\user\AppData\...\softokn3[1].dll, PE32
21->93
dropped
107
11 other malicious files
21->107
dropped
195
Attempt to bypass Chrome
Application-Bound Encryption
21->195
197
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
21->197
217
9 other signatures
21->217
53
2 other processes
21->53
137
ignoredshee.com
188.114.97.3, 443, 49995, 49997
CLOUDFLARENETUS
European Union
26->137
95
C:\Users\user\...\VXAIPJHLIAGNKZRZS3E57X.exe, PE32
26->95
dropped
97
C:\Users\...\1R8VAMVCMJURVKW1AD8R7RQGWD8J.exe, PE32
26->97
dropped
199
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
26->199
201
Query firmware table
information (likely
to detect VMs)
26->201
203
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->203
42
1R8VAMVCMJURVKW1AD8R7RQGWD8J.exe
26->42
started
99
C:\Users\user\AppData\Local\...\os46r5CTT.hta, HTML
28->99
dropped
205
Binary is likely a compiled
AutoIt script file
28->205
207
Creates HTA files
28->207
55
2 other processes
28->55
209
Suspicious powershell
command line found
30->209
211
Tries to download and
execute files (via powershell)
30->211
45
powershell.exe
15
19
30->45
started
213
Uses schtasks.exe or
at.exe to add and modify
task schedules
32->213
57
2 other processes
32->57
59
2 other processes
34->59
139
youtube.com
142.250.184.238
GOOGLEUS
United States
36->139
141
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
GOOGLEUS
United States
36->141
147
10 other IPs or domains
36->147
101
C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+
36->101
dropped
103
C:\Users\user\...\gmpopenh264.dll (copy), PE32+
36->103
dropped
105
C:\Users\user\AppData\...\places.sqlite-wal, SQLite
36->105
dropped
49
firefox.exe
36->49
started
51
conhost.exe
38->51
started
143
home.fivepp5sb.top
147.45.198.132, 49994, 80
FREE-NET-ASFREEnetEU
Russian Federation
40->143
145
httpbin.org
34.236.83.153, 443, 49991
AMAZON-AESUS
United States
40->145
215
Detected unpacking (changes
PE section rights)
40->215
219
4 other signatures
40->219
61
6 other processes
40->61
file10
signatures11
process12
dnsIp13
221
Tries to evade debugger
and weak emulator (self
modifying code)
42->221
223
Hides threads from debuggers
42->223
225
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
42->225
161
185.215.113.16, 49731, 49993, 49998
WHOLESALECONNECTIONSNL
Portugal
45->161
123
TempFQ2YRR0KRJCZJUTBZU4VHDGVNMLBHPOB.EXE, PE32
45->123
dropped
227
Found many strings related
to Crypto-Wallets (likely
being stolen)
45->227
229
Powershell drops PE
file
45->229
63
TempFQ2YRR0KRJCZJUTBZU4VHDGVNMLBHPOB.EXE
4
45->63
started
67
conhost.exe
45->67
started
163
192.168.2.6, 443, 49706, 49709
unknown
unknown
53->163
165
239.255.255.250
unknown
Reserved
53->165
231
Monitors registry run
keys for changes
53->231
69
chrome.exe
53->69
started
72
msedge.exe
53->72
started
233
Suspicious powershell
command line found
55->233
235
Tries to download and
execute files (via powershell)
55->235
74
powershell.exe
55->74
started
80
2 other processes
55->80
237
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
59->237
76
conhost.exe
61->76
started
78
conhost.exe
61->78
started
82
3 other processes
61->82
file14
signatures15
process16
dnsIp17
125
C:\Users\user\AppData\Local\...\skotes.exe, PE32
63->125
dropped
167
Multi AV Scanner detection
for dropped file
63->167
169
Detected unpacking (changes
PE section rights)
63->169
171
Tries to evade debugger
and weak emulator (self
modifying code)
63->171
173
4 other signatures
63->173
84
skotes.exe
63->84
started
149
plus.l.google.com
142.250.185.142
GOOGLEUS
United States
69->149
151
www.google.com
142.250.185.164
GOOGLEUS
United States
69->151
153
2 other IPs or domains
69->153
127
TempIT9W4RB2COSCVHXC8LEINHLFZETORTDY.EXE, PE32
74->127
dropped
87
TempIT9W4RB2COSCVHXC8LEINHLFZETORTDY.EXE
74->87
started
89
conhost.exe
74->89
started
file18
signatures19
process20
signatures21
183
Multi AV Scanner detection
for dropped file
84->183
185
Detected unpacking (changes
PE section rights)
84->185
187
Tries to evade debugger
and weak emulator (self
modifying code)
84->187
189
Hides threads from debuggers
87->189
191
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
87->191
193
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
87->193
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.