Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1677022
Sample:
random.exe
Startdate:
29/04/2025
Architecture:
WINDOWS
Score:
100
109
zenithcorde.top
2->109
111
youtube.com
2->111
113
38 other IPs or domains
2->113
131
Suricata IDS alerts
for network traffic
2->131
133
Found malware configuration
2->133
135
Antivirus detection
for URL or domain
2->135
137
24 other signatures
2->137
10
saved.exe
4
26
2->10
started
15
random.exe
1
2->15
started
17
6b145b2809.exe
2->17
started
19
6 other processes
2->19
signatures3
process4
dnsIp5
125
185.39.17.163, 49703, 49704, 49707
RU-TAGNET-ASRU
Russian Federation
10->125
89
C:\Users\user\AppData\...\9b5e20fe78.exe, PE32
10->89
dropped
91
C:\Users\user\AppData\...\1af7b87065.exe, PE32
10->91
dropped
93
C:\Users\user\AppData\...\6801963e86.exe, PE32
10->93
dropped
99
5 other malicious files
10->99
dropped
175
Contains functionality
to start a terminal
service
10->175
177
Creates multiple autostart
registry keys
10->177
21
6b145b2809.exe
1
10->21
started
25
6801963e86.exe
9
1
10->25
started
27
9b5e20fe78.exe
10->27
started
29
1af7b87065.exe
10->29
started
127
185.39.17.162, 49699, 49705, 49708
RU-TAGNET-ASRU
Russian Federation
15->127
129
zenithcorde.top
104.21.51.232, 443, 49692, 49693
CLOUDFLARENETUS
United States
15->129
95
C:\Users\user\...\PREISXEF0092UC70.exe, PE32
15->95
dropped
179
Detected unpacking (changes
PE section rights)
15->179
181
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->181
183
Query firmware table
information (likely
to detect VMs)
15->183
199
4 other signatures
15->199
31
PREISXEF0092UC70.exe
4
15->31
started
185
Found many strings related
to Crypto-Wallets (likely
being stolen)
17->185
187
Tries to steal Crypto
Currency Wallets
17->187
189
Hides threads from debuggers
17->189
33
chrome.exe
17->33
started
36
chrome.exe
17->36
started
97
C:\Users\user\AppData\Local\...\O3BBSJBKM.hta, HTML
19->97
dropped
191
Suspicious powershell
command line found
19->191
193
Binary is likely a compiled
AutoIt script file
19->193
195
Tries to download and
execute files (via powershell)
19->195
197
Creates HTA files
19->197
38
firefox.exe
19->38
started
40
6 other processes
19->40
file6
signatures7
process8
dnsIp9
83
C:\Users\user\...O3PM3KZGAZCB942NHECBP.exe, PE32
21->83
dropped
139
Antivirus detection
for dropped file
21->139
141
Detected unpacking (changes
PE section rights)
21->141
143
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
21->143
161
11 other signatures
21->161
42
EO3PM3KZGAZCB942NHECBP.exe
21->42
started
145
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
25->145
147
Modifies windows update
settings
25->147
149
Disables Windows Defender
Tamper protection
25->149
163
2 other signatures
25->163
85
C:\Users\user\AppData\Local\...\5J0a9GgaZ.hta, HTML
27->85
dropped
151
Binary is likely a compiled
AutoIt script file
27->151
153
Creates HTA files
27->153
45
mshta.exe
27->45
started
47
cmd.exe
27->47
started
51
6 other processes
29->51
87
C:\Users\user\AppData\Local\...\saved.exe, PE32
31->87
dropped
155
Multi AV Scanner detection
for dropped file
31->155
157
Contains functionality
to start a terminal
service
31->157
159
Contains functionality
to inject code into
remote processes
31->159
49
saved.exe
31->49
started
103
192.168.2.5, 138, 443, 49452
unknown
unknown
33->103
53
2 other processes
33->53
56
2 other processes
36->56
105
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216, 443, 49769, 49782
GOOGLEUS
United States
38->105
107
127.0.0.1
unknown
unknown
38->107
58
2 other processes
38->58
60
6 other processes
40->60
file10
signatures11
process12
dnsIp13
165
Suspicious powershell
command line found
45->165
167
Tries to download and
execute files (via powershell)
45->167
62
powershell.exe
45->62
started
169
Uses schtasks.exe or
at.exe to add and modify
task schedules
47->169
66
conhost.exe
47->66
started
68
schtasks.exe
47->68
started
171
Multi AV Scanner detection
for dropped file
49->171
173
Contains functionality
to start a terminal
service
49->173
70
conhost.exe
51->70
started
72
conhost.exe
51->72
started
74
conhost.exe
51->74
started
76
2 other processes
51->76
115
play.google.com
142.250.68.238, 443, 49744, 49826
GOOGLEUS
United States
53->115
117
www.google.com
142.250.69.4, 443, 49719, 49720
GOOGLEUS
United States
53->117
123
4 other IPs or domains
53->123
119
142.250.217.132, 443, 49755, 49756
GOOGLEUS
United States
56->119
121
142.250.69.10, 443, 49770, 49772
GOOGLEUS
United States
56->121
signatures14
process15
file16
101
TempYCTTLYWSOTRW5LGU6KNYABLSRUXV2VZA.EXE, PE32
62->101
dropped
205
Found many strings related
to Crypto-Wallets (likely
being stolen)
62->205
207
Powershell drops PE
file
62->207
78
TempYCTTLYWSOTRW5LGU6KNYABLSRUXV2VZA.EXE
62->78
started
81
conhost.exe
62->81
started
signatures17
process18
signatures19
201
Multi AV Scanner detection
for dropped file
78->201
203
Contains functionality
to start a terminal
service
78->203
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.