Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1673998
Sample:
random.exe
Startdate:
25/04/2025
Architecture:
WINDOWS
Score:
100
111
pastebin.com
2->111
113
owlflright.digital
2->113
115
66 other IPs or domains
2->115
129
Suricata IDS alerts
for network traffic
2->129
131
Found malware configuration
2->131
133
Antivirus detection
for URL or domain
2->133
137
27 other signatures
2->137
10
saved.exe
4
37
2->10
started
15
random.exe
1
2->15
started
17
986e92a60b.exe
2->17
started
19
5 other processes
2->19
signatures3
135
Connects to a pastebin
service (likely for
C&C)
111->135
process4
dnsIp5
117
185.39.17.163, 49728, 49729, 49731
RU-TAGNET-ASRU
Russian Federation
10->117
119
push.services.mozilla.com
10->119
87
C:\Users\user\AppData\...\7a1fc84961.exe, PE32
10->87
dropped
89
C:\Users\user\AppData\...\1061bc0603.exe, PE32
10->89
dropped
91
C:\Users\user\AppData\...\c31adf97dc.exe, PE32
10->91
dropped
97
11 other malicious files
10->97
dropped
181
Contains functionality
to start a terminal
service
10->181
183
Creates multiple autostart
registry keys
10->183
21
986e92a60b.exe
1
10->21
started
25
beee04ac19.exe
10->25
started
27
c31adf97dc.exe
10->27
started
38
2 other processes
10->38
121
185.39.17.162, 49727, 49730, 49732
RU-TAGNET-ASRU
Russian Federation
15->121
123
clarmodq.top
172.67.205.184, 443, 49713, 49716
CLOUDFLARENETUS
United States
15->123
93
C:\...\F8KR8XEBLN2H4H74C38NARIHSORDITP.exe, PE32
15->93
dropped
185
Detected unpacking (changes
PE section rights)
15->185
187
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->187
189
Query firmware table
information (likely
to detect VMs)
15->189
205
6 other signatures
15->205
29
F8KR8XEBLN2H4H74C38NARIHSORDITP.exe
4
15->29
started
95
C:\Users\user\...\OQCO9SZ09I61X2WLUGH8J.exe, PE32
17->95
dropped
191
Found many strings related
to Crypto-Wallets (likely
being stolen)
17->191
193
Tries to harvest and
steal ftp login credentials
17->193
195
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->195
197
Tries to steal from
password manager
17->197
31
chrome.exe
17->31
started
199
Suspicious powershell
command line found
19->199
201
Binary is likely a compiled
AutoIt script file
19->201
203
Tries to download and
execute files (via powershell)
19->203
34
powershell.exe
19->34
started
36
firefox.exe
19->36
started
file6
signatures7
process8
dnsIp9
81
C:\Users\user\...behaviorgraphEXVQI560SODNXQCRUZ.exe, PE32
21->81
dropped
139
Antivirus detection
for dropped file
21->139
141
Detected unpacking (changes
PE section rights)
21->141
143
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
21->143
159
8 other signatures
21->159
40
GEXVQI560SODNXQCRUZ.exe
21->40
started
145
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
25->145
161
4 other signatures
25->161
83
C:\Users\user\AppData\Local\...\KDag0QgJj.hta, HTML
27->83
dropped
147
Binary is likely a compiled
AutoIt script file
27->147
149
Creates HTA files
27->149
43
mshta.exe
27->43
started
45
cmd.exe
27->45
started
85
C:\Users\user\AppData\Local\...\saved.exe, PE32
29->85
dropped
151
Multi AV Scanner detection
for dropped file
29->151
153
Contains functionality
to start a terminal
service
29->153
155
Contains functionality
to inject code into
remote processes
29->155
47
saved.exe
29->47
started
125
192.168.2.4, 443, 49713, 49716
unknown
unknown
31->125
49
chrome.exe
31->49
started
52
conhost.exe
34->52
started
127
127.0.0.1
unknown
unknown
36->127
54
firefox.exe
36->54
started
157
Found API chain indicative
of sandbox detection
38->157
163
3 other signatures
38->163
56
MSBuild.exe
38->56
started
58
7 other processes
38->58
file10
signatures11
process12
dnsIp13
165
Suspicious powershell
command line found
43->165
167
Tries to download and
execute files (via powershell)
43->167
60
powershell.exe
43->60
started
169
Uses schtasks.exe or
at.exe to add and modify
task schedules
45->169
64
conhost.exe
45->64
started
66
schtasks.exe
45->66
started
171
Multi AV Scanner detection
for dropped file
47->171
173
Contains functionality
to start a terminal
service
47->173
101
play.google.com
142.250.68.238, 443, 49778
GOOGLEUS
United States
49->101
103
www.google.com
142.250.69.4, 443, 49756, 49757
GOOGLEUS
United States
49->103
109
4 other IPs or domains
49->109
105
t.me
149.154.167.99, 443, 49733
TELEGRAMRU
United Kingdom
56->105
107
climatologfy.top
104.21.96.1, 443, 49734, 49737
CLOUDFLARENETUS
United States
56->107
175
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
56->175
177
Query firmware table
information (likely
to detect VMs)
56->177
179
Tries to steal Crypto
Currency Wallets
56->179
68
conhost.exe
58->68
started
70
conhost.exe
58->70
started
72
conhost.exe
58->72
started
74
3 other processes
58->74
signatures14
process15
file16
99
TempH1KUX602LGQBUJELHZPXIPQKGFZ5PMZW.EXE, PE32
60->99
dropped
211
Found many strings related
to Crypto-Wallets (likely
being stolen)
60->211
213
Powershell drops PE
file
60->213
76
TempH1KUX602LGQBUJELHZPXIPQKGFZ5PMZW.EXE
60->76
started
79
conhost.exe
60->79
started
signatures17
process18
signatures19
207
Multi AV Scanner detection
for dropped file
76->207
209
Contains functionality
to start a terminal
service
76->209
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.