Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1677076
Sample:
random.exe
Startdate:
29/04/2025
Architecture:
WINDOWS
Score:
100
132
Found malware configuration
2->132
134
Antivirus detection
for URL or domain
2->134
136
Antivirus detection
for dropped file
2->136
138
25 other signatures
2->138
9
saved.exe
8
67
2->9
started
14
random.exe
1
2->14
started
16
bd2dcad23e.exe
2->16
started
18
13 other processes
2->18
process3
dnsIp4
124
185.39.17.163
RU-TAGNET-ASRU
Russian Federation
9->124
126
94.26.90.80
ASDETUKhttpwwwheficedcomGB
Bulgaria
9->126
90
C:\Users\user\AppData\...\5a663d3264.exe, PE32
9->90
dropped
92
C:\Users\user\AppData\...\b82edda50f.exe, PE32
9->92
dropped
94
C:\Users\user\AppData\...\5a48d8f91b.exe, PE32
9->94
dropped
100
29 other malicious files
9->100
dropped
178
Contains functionality
to start a terminal
service
9->178
180
Creates multiple autostart
registry keys
9->180
20
bd2dcad23e.exe
1
9->20
started
25
0b182023b7.exe
9->25
started
27
90cac6730e.exe
9->27
started
37
2 other processes
9->37
128
185.39.17.162
RU-TAGNET-ASRU
Russian Federation
14->128
130
104.21.51.232
CLOUDFLARENETUS
United States
14->130
96
C:\Users\user\...\02A8O9ETQ8HMCJ6VETGQ72.exe, PE32
14->96
dropped
182
Detected unpacking (changes
PE section rights)
14->182
184
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
14->184
186
Query firmware table
information (likely
to detect VMs)
14->186
202
6 other signatures
14->202
29
02A8O9ETQ8HMCJ6VETGQ72.exe
4
14->29
started
98
C:\Users\user\...\UQRW86CPB1B16QE6SIJOC1T.exe, PE32
16->98
dropped
188
Found many strings related
to Crypto-Wallets (likely
being stolen)
16->188
190
Tries to harvest and
steal ftp login credentials
16->190
192
Tries to harvest and
steal browser information
(history, passwords,
etc)
16->192
194
Tries to steal from
password manager
16->194
31
chrome.exe
16->31
started
33
chrome.exe
16->33
started
196
Suspicious powershell
command line found
18->196
198
Changes security center
settings (notifications,
updates, antivirus,
firewall)
18->198
200
Tries to download and
execute files (via powershell)
18->200
35
0b182023b7.exe
18->35
started
39
2 other processes
18->39
file5
signatures6
process7
dnsIp8
116
104.21.62.226
CLOUDFLARENETUS
United States
20->116
84
C:\...\0NOZM2VQDGRDCGT77GLSH7Q0P3LGF.exe, PE32
20->84
dropped
140
Antivirus detection
for dropped file
20->140
142
Detected unpacking (changes
PE section rights)
20->142
144
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
20->144
158
4 other signatures
20->158
41
0NOZM2VQDGRDCGT77GLSH7Q0P3LGF.exe
20->41
started
146
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
25->146
160
4 other signatures
25->160
86
C:\Users\user\AppData\Local\...\2KnJjHuA4.hta, HTML
27->86
dropped
148
Creates HTA files
27->148
44
mshta.exe
27->44
started
46
cmd.exe
27->46
started
88
C:\Users\user\AppData\Local\...\saved.exe, PE32
29->88
dropped
150
Multi AV Scanner detection
for dropped file
29->150
152
Contains functionality
to start a terminal
service
29->152
154
Contains functionality
to inject code into
remote processes
29->154
48
saved.exe
29->48
started
118
192.168.2.6
unknown
unknown
31->118
50
chrome.exe
31->50
started
53
chrome.exe
33->53
started
162
3 other signatures
35->162
156
Binary is likely a compiled
AutoIt script file
37->156
164
3 other signatures
37->164
55
taskkill.exe
37->55
started
57
5 other processes
37->57
120
35.190.72.216
GOOGLEUS
United States
39->120
122
127.0.0.1
unknown
unknown
39->122
59
3 other processes
39->59
file9
signatures10
process11
dnsIp12
166
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
44->166
168
Suspicious powershell
command line found
44->168
170
Tries to download and
execute files (via powershell)
44->170
61
powershell.exe
44->61
started
172
Uses schtasks.exe or
at.exe to add and modify
task schedules
46->172
65
conhost.exe
46->65
started
67
schtasks.exe
46->67
started
174
Multi AV Scanner detection
for dropped file
48->174
176
Contains functionality
to start a terminal
service
48->176
104
142.250.101.84
GOOGLEUS
United States
50->104
106
142.250.217.142
GOOGLEUS
United States
50->106
112
5 other IPs or domains
50->112
108
142.250.176.3
GOOGLEUS
United States
53->108
110
142.250.68.228
GOOGLEUS
United States
53->110
114
4 other IPs or domains
53->114
69
conhost.exe
55->69
started
71
conhost.exe
57->71
started
73
conhost.exe
57->73
started
75
conhost.exe
57->75
started
77
conhost.exe
57->77
started
signatures13
process14
file15
102
TempBWUJDHZRPGVXHY012ZWGB4NDVSUVSDGM.EXE, PE32
61->102
dropped
204
Powershell drops PE
file
61->204
79
TempBWUJDHZRPGVXHY012ZWGB4NDVSUVSDGM.EXE
61->79
started
82
conhost.exe
61->82
started
signatures16
process17
signatures18
206
Multi AV Scanner detection
for dropped file
79->206
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.