Threat name:
Amadey, Credential Flusher, Healer AV Di
Alert
Classification:
phis.troj.spyw.evad.mine
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Credential Flusher
Yara detected Healer AV Disabler
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1673930
Sample:
WKz1XQRzTm.exe
Startdate:
25/04/2025
Architecture:
WINDOWS
Score:
100
113
pastebin.com
2->113
115
wolverineas.top
2->115
117
72 other IPs or domains
2->117
161
Suricata IDS alerts
for network traffic
2->161
163
Found malware configuration
2->163
165
Antivirus detection
for URL or domain
2->165
169
29 other signatures
2->169
12
WKz1XQRzTm.exe
1
2->12
started
17
735820f4c1.exe
2->17
started
19
9dc71cf057.exe
2->19
started
21
13 other processes
2->21
signatures3
167
Connects to a pastebin
service (likely for
C&C)
113->167
process4
dnsIp5
127
185.39.17.162, 49690, 49701, 49705
RU-TAGNET-ASRU
Russian Federation
12->127
129
clarmodq.top
172.67.205.184, 443, 49683, 49684
CLOUDFLARENETUS
United States
12->129
103
C:\Users\user\...\2VBK8LPUAGEDUI6ZGCY.exe, PE32
12->103
dropped
203
Detected unpacking (changes
PE section rights)
12->203
205
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
12->205
207
Query firmware table
information (likely
to detect VMs)
12->207
225
3 other signatures
12->225
23
2VBK8LPUAGEDUI6ZGCY.exe
4
12->23
started
27
conhost.exe
12->27
started
209
Found many strings related
to Crypto-Wallets (likely
being stolen)
17->209
211
Tries to harvest and
steal ftp login credentials
17->211
213
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->213
215
Tries to steal from
password manager
17->215
29
chrome.exe
17->29
started
227
3 other signatures
19->227
131
127.0.0.1
unknown
unknown
21->131
217
Suspicious powershell
command line found
21->217
219
Contains functionality
to start a terminal
service
21->219
221
Changes security center
settings (notifications,
updates, antivirus,
firewall)
21->221
223
Tries to download and
execute files (via powershell)
21->223
32
firefox.exe
21->32
started
34
powershell.exe
21->34
started
file6
signatures7
process8
dnsIp9
99
C:\Users\user\AppData\Local\...\saved.exe, PE32
23->99
dropped
177
Multi AV Scanner detection
for dropped file
23->177
179
Contains functionality
to start a terminal
service
23->179
181
Contains functionality
to inject code into
remote processes
23->181
36
saved.exe
8
76
23->36
started
133
192.168.2.9, 443, 49672, 49683
unknown
unknown
29->133
41
chrome.exe
29->41
started
43
firefox.exe
32->43
started
45
conhost.exe
34->45
started
file10
signatures11
process12
dnsIp13
119
185.39.17.163, 49696, 49699, 49704
RU-TAGNET-ASRU
Russian Federation
36->119
91
C:\Users\user\AppData\...\36d2893956.exe, PE32
36->91
dropped
93
C:\Users\user\AppData\Local\...\ajNyRQT.exe, PE32+
36->93
dropped
95
C:\Users\user\AppData\Local\...\iyHA21b.exe, PE32
36->95
dropped
97
17 other malicious files
36->97
dropped
171
Multi AV Scanner detection
for dropped file
36->171
173
Contains functionality
to start a terminal
service
36->173
175
Creates multiple autostart
registry keys
36->175
47
735820f4c1.exe
36->47
started
51
9dc71cf057.exe
36->51
started
53
32371198cc.exe
36->53
started
55
2 other processes
36->55
121
www.google.com
142.250.69.4, 443, 49729, 49731
GOOGLEUS
United States
41->121
123
plus.l.google.com
41->123
125
3 other IPs or domains
41->125
file14
signatures15
process16
file17
105
C:\Users\...\DPK2WUTE6WB2OOFDRFRLTFG9BM.exe, PE32
47->105
dropped
135
Antivirus detection
for dropped file
47->135
137
Multi AV Scanner detection
for dropped file
47->137
139
Detected unpacking (changes
PE section rights)
47->139
157
9 other signatures
47->157
57
DPK2WUTE6WB2OOFDRFRLTFG9BM.exe
47->57
started
141
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
51->141
143
Modifies windows update
settings
51->143
159
3 other signatures
51->159
107
C:\Users\user\AppData\Local\...\JVB1uLLjL.hta, HTML
53->107
dropped
145
Binary is likely a compiled
AutoIt script file
53->145
147
Creates HTA files
53->147
60
mshta.exe
53->60
started
62
cmd.exe
53->62
started
149
Found API chain indicative
of sandbox detection
55->149
151
Writes to foreign memory
regions
55->151
153
Allocates memory in
foreign processes
55->153
155
Injects a PE file into
a foreign processes
55->155
64
MSBuild.exe
55->64
started
67
taskkill.exe
55->67
started
69
MSBuild.exe
55->69
started
71
6 other processes
55->71
signatures18
process19
dnsIp20
183
Multi AV Scanner detection
for dropped file
57->183
185
Contains functionality
to start a terminal
service
57->185
187
Suspicious powershell
command line found
60->187
189
Tries to download and
execute files (via powershell)
60->189
73
powershell.exe
60->73
started
191
Uses schtasks.exe or
at.exe to add and modify
task schedules
62->191
77
conhost.exe
62->77
started
79
schtasks.exe
62->79
started
109
t.me
149.154.167.99, 443, 49706
TELEGRAMRU
United Kingdom
64->109
111
climatologfy.top
104.21.112.1, 443, 49707, 49710
CLOUDFLARENETUS
United States
64->111
193
Query firmware table
information (likely
to detect VMs)
64->193
195
Tries to steal Crypto
Currency Wallets
64->195
197
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
67->197
81
conhost.exe
67->81
started
83
conhost.exe
71->83
started
85
conhost.exe
71->85
started
87
conhost.exe
71->87
started
signatures21
process22
file23
101
TempH0VNQJU45A21NGOJYDGMHH3FOKL7ETEV.EXE, PE32
73->101
dropped
199
Contains functionality
to start a terminal
service
73->199
201
Powershell drops PE
file
73->201
89
conhost.exe
73->89
started
signatures24
process25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.