Threat name:
Amadey, Babadeda, Credential Flusher, GC
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Suspicious MSHTA Child Process
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected PureLog Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1596825
Sample:
random.exe
Startdate:
22/01/2025
Architecture:
WINDOWS
Score:
100
126
measlyrefusz.biz
2->126
128
youtube.com
2->128
130
33 other IPs or domains
2->130
154
Suricata IDS alerts
for network traffic
2->154
156
Found malware configuration
2->156
158
Antivirus detection
for URL or domain
2->158
160
26 other signatures
2->160
11
skotes.exe
4
33
2->11
started
16
random.exe
5
2->16
started
18
d22649ccfa.exe
2->18
started
20
6 other processes
2->20
signatures3
process4
dnsIp5
146
185.215.113.16, 56795, 56837, 56877
WHOLESALECONNECTIONSNL
Portugal
11->146
148
185.215.113.43, 56714, 56725, 56761
WHOLESALECONNECTIONSNL
Portugal
11->148
150
185.215.113.39, 56731, 56763, 80
WHOLESALECONNECTIONSNL
Portugal
11->150
106
C:\Users\user\AppData\...\5e71f3c07e.exe, PE32
11->106
dropped
108
C:\Users\user\AppData\...\ebdb428afd.exe, PE32
11->108
dropped
110
C:\Users\user\AppData\...\0ce0f47f93.exe, PE32
11->110
dropped
120
9 other malicious files
11->120
dropped
218
Creates multiple autostart
registry keys
11->218
220
Hides threads from debuggers
11->220
242
2 other signatures
11->242
22
d22649ccfa.exe
11->22
started
27
5e71f3c07e.exe
11->27
started
29
e719653bdd.exe
33
11->29
started
39
3 other processes
11->39
112
C:\Users\user\AppData\Local\...\skotes.exe, PE32
16->112
dropped
114
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
16->114
dropped
222
Detected unpacking (changes
PE section rights)
16->222
224
Tries to evade debugger
and weak emulator (self
modifying code)
16->224
226
Tries to detect virtualization
through RDTSC time measurements
16->226
31
skotes.exe
16->31
started
116
C:\Users\...\WOQI55GHJ5K807ORQVA1KT5S.exe, PE32
18->116
dropped
118
C:\Users\...1187WQPBINBMM9F667KLVEQ6VI.exe, PE32
18->118
dropped
228
Query firmware table
information (likely
to detect VMs)
18->228
230
Tries to harvest and
steal ftp login credentials
18->230
232
Tries to harvest and
steal browser information
(history, passwords,
etc)
18->232
234
Tries to steal Crypto
Currency Wallets
18->234
236
Suspicious powershell
command line found
20->236
238
Binary is likely a compiled
AutoIt script file
20->238
240
Tries to download and
execute files (via powershell)
20->240
33
powershell.exe
20->33
started
35
firefox.exe
20->35
started
37
taskkill.exe
20->37
started
file6
signatures7
process8
dnsIp9
132
measlyrefusz.biz
172.67.191.143, 443, 56836, 56845
CLOUDFLARENETUS
United States
22->132
94
C:\Users\user\...\XJOMDZKPECFNQXE3FN.exe, PE32
22->94
dropped
96
C:\Users\user\...96DCWQRDC5A5H2XA209O11.exe, PE32
22->96
dropped
162
Antivirus detection
for dropped file
22->162
164
Multi AV Scanner detection
for dropped file
22->164
166
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
22->166
182
2 other signatures
22->182
41
XJOMDZKPECFNQXE3FN.exe
22->41
started
44
NDCWQRDC5A5H2XA209O11.exe
22->44
started
168
Detected unpacking (overwrites
its own PE header)
27->168
170
Machine Learning detection
for dropped file
27->170
46
cmd.exe
27->46
started
134
185.156.73.23, 56793, 80
RELDAS-NETRU
Russian Federation
29->134
98
C:\Users\user\AppData\Local\...\Y-Cleaner.exe, PE32
29->98
dropped
100
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
29->100
dropped
102
C:\Users\user\AppData\Local\...\soft[1], PE32
29->102
dropped
104
C:\Users\user\AppData\Local\...\dll[1], PE32
29->104
dropped
172
Detected unpacking (changes
PE section rights)
29->172
184
2 other signatures
29->184
186
2 other signatures
31->186
49
483d2fa8a0d53818306efeb32d3.exe
33->49
started
51
conhost.exe
33->51
started
136
youtube.com
142.250.186.46, 443, 57038, 57040
GOOGLEUS
United States
35->136
138
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82, 57037, 57041, 80
GOOGLEUS
United States
35->138
142
3 other IPs or domains
35->142
58
2 other processes
35->58
53
conhost.exe
37->53
started
140
185.215.113.206, 56878, 57022, 80
WHOLESALECONNECTIONSNL
Portugal
39->140
174
Binary is likely a compiled
AutoIt script file
39->174
176
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->176
178
Contains functionality
to inject code into
remote processes
39->178
180
Injects a PE file into
a foreign processes
39->180
55
210b0d7990.exe
39->55
started
60
7 other processes
39->60
file10
signatures11
process12
dnsIp13
188
Multi AV Scanner detection
for dropped file
41->188
190
Detected unpacking (changes
PE section rights)
41->190
192
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
41->192
194
Tries to evade debugger
and weak emulator (self
modifying code)
44->194
196
Hides threads from debuggers
44->196
198
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
44->198
122
C:\Temp\LMEBs5eaf.hta, HTML
46->122
dropped
200
Uses schtasks.exe or
at.exe to add and modify
task schedules
46->200
202
Creates HTA files
46->202
62
mshta.exe
46->62
started
65
cmd.exe
46->65
started
67
cmd.exe
46->67
started
75
4 other processes
46->75
204
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
49->204
144
cultureddirtys.click
172.67.150.129, 443, 56782, 56801
CLOUDFLARENETUS
United States
55->144
206
Query firmware table
information (likely
to detect VMs)
55->206
208
Tries to steal Crypto
Currency Wallets
55->208
69
conhost.exe
60->69
started
71
conhost.exe
60->71
started
73
conhost.exe
60->73
started
77
2 other processes
60->77
file14
signatures15
process16
signatures17
244
Suspicious powershell
command line found
62->244
246
Tries to download and
execute files (via powershell)
62->246
79
powershell.exe
62->79
started
82
powershell.exe
65->82
started
85
powershell.exe
67->85
started
87
powershell.exe
75->87
started
process18
file19
124
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
79->124
dropped
89
483d2fa8a0d53818306efeb32d3.exe
79->89
started
92
conhost.exe
79->92
started
152
Powershell drops PE
file
82->152
signatures20
process21
signatures22
210
Multi AV Scanner detection
for dropped file
89->210
212
Machine Learning detection
for dropped file
89->212
214
Modifies windows update
settings
89->214
216
7 other signatures
89->216
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.