Threat name:
Amadey, LummaC Stealer, RHADAMANTHYS
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected RHADAMANTHYS Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1673964
Sample:
random.exe
Startdate:
25/04/2025
Architecture:
WINDOWS
Score:
100
84
wolverineas.top
2->84
86
youtube.com
2->86
88
48 other IPs or domains
2->88
112
Suricata IDS alerts
for network traffic
2->112
114
Found malware configuration
2->114
116
Antivirus detection
for URL or domain
2->116
118
24 other signatures
2->118
10
saved.exe
3
50
2->10
started
15
random.exe
1
2->15
started
17
6eb00c469e.exe
2->17
started
19
saved.exe
2->19
started
signatures3
process4
dnsIp5
106
185.39.17.163, 49730, 49731, 49735
RU-TAGNET-ASRU
Russian Federation
10->106
74
C:\Users\user\AppData\...\176ffa278f.exe, PE32
10->74
dropped
76
C:\Users\user\AppData\...\16374ddb00.exe, PE32
10->76
dropped
78
C:\Users\user\AppData\...\3a64b47286.exe, PE32
10->78
dropped
82
17 other malicious files
10->82
dropped
164
Contains functionality
to start a terminal
service
10->164
166
Creates multiple autostart
registry keys
10->166
21
6eb00c469e.exe
10->21
started
25
684621da07.exe
10->25
started
28
3a64b47286.exe
10->28
started
34
8 other processes
10->34
108
185.39.17.162, 49729, 49732, 49736
RU-TAGNET-ASRU
Russian Federation
15->108
110
clarmodq.top
172.67.205.184, 443, 49721, 49722
CLOUDFLARENETUS
United States
15->110
80
C:\...behaviorgraph5MDVW1RSST92YBJP0O31FTL9C0INA.exe, PE32
15->80
dropped
168
Detected unpacking (changes
PE section rights)
15->168
170
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->170
172
Query firmware table
information (likely
to detect VMs)
15->172
180
3 other signatures
15->180
30
G5MDVW1RSST92YBJP0O31FTL9C0INA.exe
4
15->30
started
174
Tries to steal Crypto
Currency Wallets
17->174
176
Hides threads from debuggers
17->176
178
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->178
32
chrome.exe
17->32
started
file6
signatures7
process8
dnsIp9
68
C:\Users\...\AFXFSVVYVLN5BQIGDJHUPHLM78F.exe, PE32
21->68
dropped
138
Antivirus detection
for dropped file
21->138
140
Multi AV Scanner detection
for dropped file
21->140
142
Detected unpacking (changes
PE section rights)
21->142
156
8 other signatures
21->156
36
AFXFSVVYVLN5BQIGDJHUPHLM78F.exe
21->36
started
90
vigorbridgoe.top
172.67.151.40, 443, 49748, 49753
CLOUDFLARENETUS
United States
25->90
144
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
25->144
146
Query firmware table
information (likely
to detect VMs)
25->146
158
2 other signatures
25->158
160
4 other signatures
28->160
70
C:\Users\user\AppData\Local\...\saved.exe, PE32
30->70
dropped
148
Contains functionality
to start a terminal
service
30->148
150
Contains functionality
to inject code into
remote processes
30->150
39
saved.exe
30->39
started
41
chrome.exe
32->41
started
92
154.81.179.131
MULTA-ASN1US
Seychelles
34->92
94
climatologfy.top
104.21.48.1, 443, 49734, 49737
CLOUDFLARENETUS
United States
34->94
96
pomelohgj.top
104.21.71.199, 443, 49757, 49763
CLOUDFLARENETUS
United States
34->96
72
C:\Users\user\AppData\Local\...\Xv4R6lVLD.hta, HTML
34->72
dropped
152
System process connects
to network (likely due
to code injection or
exploit)
34->152
154
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
34->154
162
5 other signatures
34->162
44
mshta.exe
34->44
started
46
MSBuild.exe
34->46
started
48
MSBuild.exe
34->48
started
50
8 other processes
34->50
file10
signatures11
process12
dnsIp13
120
Multi AV Scanner detection
for dropped file
39->120
122
Contains functionality
to start a terminal
service
39->122
98
www.google.com
142.250.69.4
GOOGLEUS
United States
41->98
124
Suspicious powershell
command line found
44->124
126
Tries to download and
execute files (via powershell)
44->126
52
powershell.exe
44->52
started
100
wolverineas.top
172.67.217.202, 443, 49762
CLOUDFLARENETUS
United States
46->100
102
steamcommunity.com
23.52.218.12, 443, 49759
TelecentroSAAR
United States
46->102
128
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
46->128
130
Query firmware table
information (likely
to detect VMs)
46->130
132
Tries to steal Crypto
Currency Wallets
46->132
104
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
48->104
134
Uses schtasks.exe or
at.exe to add and modify
task schedules
50->134
56
conhost.exe
50->56
started
58
conhost.exe
50->58
started
60
conhost.exe
50->60
started
62
3 other processes
50->62
signatures14
process15
file16
66
Temp6DGOWLXQAM9N9Z4SS8EFNTCTN75GDCP7.EXE, PE32
52->66
dropped
136
Powershell drops PE
file
52->136
64
conhost.exe
52->64
started
signatures17
process18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.