Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1674290
Sample:
random.exe
Startdate:
25/04/2025
Architecture:
WINDOWS
Score:
100
94
tropiscbs.live
2->94
96
topographky.top
2->96
98
55 other IPs or domains
2->98
128
Suricata IDS alerts
for network traffic
2->128
130
Found malware configuration
2->130
132
Antivirus detection
for URL or domain
2->132
134
26 other signatures
2->134
10
saved.exe
4
41
2->10
started
15
random.exe
1
2->15
started
17
c96caca773.exe
2->17
started
19
4 other processes
2->19
signatures3
process4
dnsIp5
110
185.39.17.163, 49699, 49701, 49704
RU-TAGNET-ASRU
Russian Federation
10->110
82
C:\Users\user\AppData\...\c0fa2f74ab.exe, PE32
10->82
dropped
84
C:\Users\user\AppData\...\684402b0ec.exe, PE32
10->84
dropped
86
C:\Users\user\AppData\...\f48b2abc3b.exe, PE32
10->86
dropped
90
14 other malicious files
10->90
dropped
178
Contains functionality
to start a terminal
service
10->178
180
Creates multiple autostart
registry keys
10->180
21
c96caca773.exe
10->21
started
25
RtRra7v.exe
10->25
started
28
d9c3c3f39d.exe
10->28
started
40
4 other processes
10->40
112
185.39.17.162, 49698, 49702, 49705
RU-TAGNET-ASRU
Russian Federation
15->112
114
clarmodq.top
172.67.205.184, 443, 49685, 49688
CLOUDFLARENETUS
United States
15->114
88
C:\Users\...\2KEXS22QHZ5P2010Y95B2ENXQ0W.exe, PE32
15->88
dropped
182
Detected unpacking (changes
PE section rights)
15->182
184
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->184
186
Query firmware table
information (likely
to detect VMs)
15->186
200
3 other signatures
15->200
30
2KEXS22QHZ5P2010Y95B2ENXQ0W.exe
4
15->30
started
188
Found many strings related
to Crypto-Wallets (likely
being stolen)
17->188
190
Tries to steal Crypto
Currency Wallets
17->190
192
Hides threads from debuggers
17->192
32
chrome.exe
17->32
started
34
chrome.exe
17->34
started
194
Suspicious powershell
command line found
19->194
196
Tries to download and
execute files (via powershell)
19->196
198
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
19->198
36
firefox.exe
19->36
started
38
powershell.exe
19->38
started
file6
signatures7
process8
dnsIp9
76
C:\Users\user\...\HXCIZ4SB4EBOMAC5CH.exe, PE32
21->76
dropped
136
Antivirus detection
for dropped file
21->136
138
Multi AV Scanner detection
for dropped file
21->138
140
Detected unpacking (changes
PE section rights)
21->140
154
7 other signatures
21->154
42
HXCIZ4SB4EBOMAC5CH.exe
21->42
started
100
tropiscbs.live
172.67.211.127, 443, 49703, 49706
CLOUDFLARENETUS
United States
25->100
142
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
25->142
144
Query firmware table
information (likely
to detect VMs)
25->144
156
2 other signatures
25->156
158
5 other signatures
28->158
78
C:\Users\user\AppData\Local\...\saved.exe, PE32
30->78
dropped
146
Contains functionality
to start a terminal
service
30->146
148
Contains functionality
to inject code into
remote processes
30->148
45
saved.exe
30->45
started
102
192.168.2.6, 443, 49685, 49688
unknown
unknown
32->102
47
chrome.exe
32->47
started
50
chrome.exe
34->50
started
104
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
GOOGLEUS
United States
36->104
106
127.0.0.1
unknown
unknown
36->106
150
Found many strings related
to Crypto-Wallets (likely
being stolen)
36->150
52
firefox.exe
36->52
started
54
conhost.exe
38->54
started
108
topographky.top
104.21.14.167, 443, 49711, 49714
CLOUDFLARENETUS
United States
40->108
80
C:\Users\user\AppData\Local\...\7cCvUlonk.hta, HTML
40->80
dropped
152
Binary is likely a compiled
AutoIt script file
40->152
160
4 other signatures
40->160
56
mshta.exe
40->56
started
58
MSBuild.exe
40->58
started
60
7 other processes
40->60
file10
signatures11
process12
dnsIp13
162
Multi AV Scanner detection
for dropped file
45->162
164
Contains functionality
to start a terminal
service
45->164
116
play.google.com
142.250.68.238
GOOGLEUS
United States
47->116
118
plus.l.google.com
47->118
126
2 other IPs or domains
47->126
120
www.google.com
192.178.49.196, 443, 49747, 49748
GOOGLEUS
United States
50->120
166
Suspicious powershell
command line found
56->166
168
Tries to download and
execute files (via powershell)
56->168
62
powershell.exe
56->62
started
122
t.me
149.154.167.99, 443, 49721
TELEGRAMRU
United Kingdom
58->122
124
techwaveg.run
104.21.58.253, 443, 49723, 49724
CLOUDFLARENETUS
United States
58->124
170
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
58->170
172
Query firmware table
information (likely
to detect VMs)
58->172
174
Tries to steal Crypto
Currency Wallets
58->174
176
Uses schtasks.exe or
at.exe to add and modify
task schedules
60->176
66
conhost.exe
60->66
started
68
conhost.exe
60->68
started
70
conhost.exe
60->70
started
72
4 other processes
60->72
signatures14
process15
file16
92
TempOQJWIIRNOL1J9WVEXVERRU2PWW5BA6JH.EXE, PE32
62->92
dropped
202
Powershell drops PE
file
62->202
74
conhost.exe
62->74
started
signatures17
process18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.