Threat name:
Amadey, Babadeda, Credential Flusher, Cr
Alert
Classification:
phis.troj.spyw.evad
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Leaks process information
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Suspicious MSHTA Child Process
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1596243
Sample:
random.exe
Startdate:
21/01/2025
Architecture:
WINDOWS
Score:
100
127
toppyneedus.biz
2->127
129
beevasyeip.bond
2->129
131
21 other IPs or domains
2->131
153
Suricata IDS alerts
for network traffic
2->153
155
Found malware configuration
2->155
157
Antivirus detection
for URL or domain
2->157
159
27 other signatures
2->159
11
skotes.exe
4
37
2->11
started
16
random.exe
5
2->16
started
18
cbe9a54aaf.exe
2->18
started
20
6 other processes
2->20
signatures3
process4
dnsIp5
147
185.215.113.16, 49826, 49865, 49900
WHOLESALECONNECTIONSNL
Portugal
11->147
149
185.215.113.43, 49757, 49773, 49820
WHOLESALECONNECTIONSNL
Portugal
11->149
151
185.215.113.39, 49779, 49964, 80
WHOLESALECONNECTIONSNL
Portugal
11->151
109
C:\Users\user\AppData\...\0a2d0e0184.exe, PE32
11->109
dropped
111
C:\Users\user\AppData\...\d4c5dc0da9.exe, PE32
11->111
dropped
113
C:\Users\user\AppData\...\42dc51adf8.exe, PE32
11->113
dropped
123
11 other malicious files
11->123
dropped
217
Creates multiple autostart
registry keys
11->217
219
Hides threads from debuggers
11->219
221
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->221
22
cbe9a54aaf.exe
2
11->22
started
27
42dc51adf8.exe
11->27
started
29
d4c5dc0da9.exe
11->29
started
39
4 other processes
11->39
115
C:\Users\user\AppData\Local\...\skotes.exe, PE32
16->115
dropped
117
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
16->117
dropped
223
Detected unpacking (changes
PE section rights)
16->223
225
Tries to evade debugger
and weak emulator (self
modifying code)
16->225
227
Tries to detect virtualization
through RDTSC time measurements
16->227
31
skotes.exe
16->31
started
119
C:\...\OUANQELH84ZFJLR0QQ0IANQZVFH9L.exe, PE32
18->119
dropped
121
C:\Users\user\...behaviorgraphVB9WP25D9C2Z82UDHL.exe, PE32
18->121
dropped
229
Query firmware table
information (likely
to detect VMs)
18->229
231
Found many strings related
to Crypto-Wallets (likely
being stolen)
18->231
233
Tries to harvest and
steal ftp login credentials
18->233
235
Tries to steal Crypto
Currency Wallets
18->235
237
Suspicious powershell
command line found
20->237
239
Tries to download and
execute files (via powershell)
20->239
241
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
20->241
33
powershell.exe
20->33
started
35
firefox.exe
20->35
started
37
taskkill.exe
20->37
started
file6
signatures7
process8
dnsIp9
133
toppyneedus.biz
104.21.29.142, 443, 49863, 49873
CLOUDFLARENETUS
United States
22->133
97
C:\Users\user\...\IDLG1O21YJRJ883N3ES.exe, PE32
22->97
dropped
99
C:\Users\user\...\8D84YA4NJRN8IF30HDL.exe, PE32
22->99
dropped
163
Antivirus detection
for dropped file
22->163
165
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
22->165
167
Query firmware table
information (likely
to detect VMs)
22->167
181
3 other signatures
22->181
41
IDLG1O21YJRJ883N3ES.exe
22->41
started
44
8D84YA4NJRN8IF30HDL.exe
22->44
started
169
Detected unpacking (overwrites
its own PE header)
27->169
171
Machine Learning detection
for dropped file
27->171
46
cmd.exe
27->46
started
135
beevasyeip.bond
104.21.15.29
CLOUDFLARENETUS
United States
29->135
173
Multi AV Scanner detection
for dropped file
29->173
183
2 other signatures
29->183
175
Detected unpacking (changes
PE section rights)
31->175
185
2 other signatures
31->185
49
483d2fa8a0d53818306efeb32d3.exe
33->49
started
51
conhost.exe
33->51
started
137
youtube.com
142.250.185.174
GOOGLEUS
United States
35->137
143
7 other IPs or domains
35->143
57
2 other processes
35->57
53
conhost.exe
37->53
started
139
185.215.113.206, 49912, 80
WHOLESALECONNECTIONSNL
Portugal
39->139
141
185.156.73.23
RELDAS-NETRU
Russian Federation
39->141
145
2 other IPs or domains
39->145
101
C:\Users\user\AppData\Local\...\Y-Cleaner.exe, PE32
39->101
dropped
103
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
39->103
dropped
105
C:\Users\user\AppData\Local\...\soft[1], PE32
39->105
dropped
107
C:\Users\user\AppData\Local\...\dll[1], PE32
39->107
dropped
177
Binary is likely a compiled
AutoIt script file
39->177
179
Found API chain indicative
of sandbox detection
39->179
187
2 other signatures
39->187
55
taskkill.exe
39->55
started
59
5 other processes
39->59
file10
signatures11
process12
file13
189
Antivirus detection
for dropped file
41->189
191
Detected unpacking (changes
PE section rights)
41->191
193
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
41->193
195
Machine Learning detection
for dropped file
44->195
197
Tries to evade debugger
and weak emulator (self
modifying code)
44->197
199
Hides threads from debuggers
44->199
125
C:\Temp\aRIShjgn9.hta, HTML
46->125
dropped
201
Uses schtasks.exe or
at.exe to add and modify
task schedules
46->201
203
Creates HTA files
46->203
61
mshta.exe
46->61
started
64
cmd.exe
46->64
started
66
cmd.exe
46->66
started
78
4 other processes
46->78
205
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
49->205
207
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
49->207
68
conhost.exe
55->68
started
70
conhost.exe
59->70
started
72
conhost.exe
59->72
started
74
conhost.exe
59->74
started
76
conhost.exe
59->76
started
signatures14
process15
signatures16
243
Suspicious powershell
command line found
61->243
245
Tries to download and
execute files (via powershell)
61->245
80
powershell.exe
61->80
started
83
powershell.exe
64->83
started
86
powershell.exe
66->86
started
88
powershell.exe
78->88
started
process17
file18
95
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
80->95
dropped
90
483d2fa8a0d53818306efeb32d3.exe
80->90
started
93
conhost.exe
80->93
started
161
Powershell drops PE
file
83->161
signatures19
process20
signatures21
209
Detected unpacking (changes
PE section rights)
90->209
211
Machine Learning detection
for dropped file
90->211
213
Modifies windows update
settings
90->213
215
7 other signatures
90->215
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.