Threat name:
Amadey, CyberGate, LummaC Stealer, Venom
Alert
Classification:
phis.troj.spyw.evad.mine
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites Mozilla Firefox settings
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses dynamic DNS services
Uses threadpools to delay analysis
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected CyberGate RAT
Yara detected LummaC Stealer
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1703747
Sample:
Yr2JKinYLW.exe
Startdate:
02/06/2025
Architecture:
WINDOWS
Score:
100
144
brolyx95.duckdns.org
2->144
146
witchdbhy.run
2->146
148
25 other IPs or domains
2->148
200
Suricata IDS alerts
for network traffic
2->200
202
Found malware configuration
2->202
204
Malicious sample detected
(through community Yara
rule)
2->204
208
25 other signatures
2->208
12
Yr2JKinYLW.exe
1
2->12
started
17
9ea87a847d.exe
2->17
started
19
9ea87a847d.exe
2->19
started
21
4 other processes
2->21
signatures3
206
Uses dynamic DNS services
144->206
process4
dnsIp5
168
185.156.72.2, 49709, 49712, 49716
ITDELUXE-ASRU
Russian Federation
12->168
170
witchdbhy.run
195.82.147.188, 443, 49692, 49693
DREAMTORRENT-CORP-ASRU
Russian Federation
12->170
172
2 other IPs or domains
12->172
126
C:\Users\user\...\O9MR7TG5LODXOIBSYMNI.exe, PE32
12->126
dropped
252
Detected unpacking (changes
PE section rights)
12->252
254
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
12->254
256
Query firmware table
information (likely
to detect VMs)
12->256
274
2 other signatures
12->274
23
O9MR7TG5LODXOIBSYMNI.exe
4
12->23
started
128
C:\...\D2BMAV8XD4C5NIJR2CAOSL9UJK97X.exe, PE32
17->128
dropped
258
Tries to harvest and
steal ftp login credentials
17->258
260
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->260
262
Tries to steal Crypto
Currency Wallets
17->262
264
Tries to steal from
password manager
17->264
130
C:\Users\...\2K7W1HR92FIOKP6XD3B016U3.exe, PE32
19->130
dropped
266
Hides threads from debuggers
19->266
268
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
19->268
270
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->270
27
chrome.exe
19->27
started
29
chrome.exe
19->29
started
31
chrome.exe
19->31
started
33
chrome.exe
19->33
started
132
C:\Users\user\AppData\...\0ffb17b21b.exe, PE32
21->132
dropped
272
Contains functionality
to start a terminal
service
21->272
35
0ffb17b21b.exe
21->35
started
file6
signatures7
process8
file9
118
C:\Users\user\AppData\Local\...\ramez.exe, PE32
23->118
dropped
218
Multi AV Scanner detection
for dropped file
23->218
220
Detected unpacking (changes
PE section rights)
23->220
222
Contains functionality
to start a terminal
service
23->222
224
7 other signatures
23->224
37
ramez.exe
1
77
23->37
started
42
chrome.exe
27->42
started
44
chrome.exe
27->44
started
46
chrome.exe
29->46
started
120
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
35->120
dropped
122
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
35->122
dropped
124
C:\Users\user\AppData\Local\...\dll[1], PE32
35->124
dropped
signatures10
process11
dnsIp12
150
185.156.72.96, 49710, 49711, 49713
ITDELUXE-ASRU
Russian Federation
37->150
152
77.83.207.69
DINET-ASRU
Russian Federation
37->152
110
C:\Users\user\AppData\Local\...\VCGo2Si.exe, PE32
37->110
dropped
112
C:\Users\user\AppData\Local\...\VCGo2Si.exe, PE32
37->112
dropped
114
C:\Users\user\AppData\...\2040440a23.exe, PE32+
37->114
dropped
116
37 other malicious files
37->116
dropped
210
Multi AV Scanner detection
for dropped file
37->210
212
Detected unpacking (changes
PE section rights)
37->212
214
Contains functionality
to start a terminal
service
37->214
216
7 other signatures
37->216
48
9ea87a847d.exe
37->48
started
52
q4LTl2d.exe
37->52
started
54
d82a6f9738.exe
37->54
started
56
9 other processes
37->56
154
www.google.com
142.250.115.106
GOOGLEUS
United States
42->154
156
play.google.com
172.217.14.238
GOOGLEUS
United States
42->156
160
3 other IPs or domains
42->160
158
142.250.113.104
GOOGLEUS
United States
46->158
file13
signatures14
process15
dnsIp16
94
C:\Users\...\M3VINFFLTQGHHIK5MELWX1NCQBBX.exe, PE32
48->94
dropped
174
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
48->174
176
Query firmware table
information (likely
to detect VMs)
48->176
194
5 other signatures
48->194
59
M3VINFFLTQGHHIK5MELWX1NCQBBX.exe
48->59
started
96
C:\directory\CyberGate\install\server.exe, PE32
52->96
dropped
178
Multi AV Scanner detection
for dropped file
52->178
180
Creates an undocumented
autostart registry key
52->180
182
Creates multiple autostart
registry keys
52->182
196
2 other signatures
52->196
62
explorer.exe
52->62
started
64
explorer.exe
52->64
started
76
2 other processes
52->76
184
Attempt to bypass Chrome
Application-Bound Encryption
54->184
198
2 other signatures
54->198
67
d82a6f9738.exe
54->67
started
70
conhost.exe
54->70
started
162
151.242.63.190
RASANAIR
Iran (ISLAMIC Republic Of)
56->162
164
193.124.205.63, 4449, 49720
AS-REGRU
Russian Federation
56->164
166
3 other IPs or domains
56->166
98
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
56->98
dropped
100
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
56->100
dropped
102
C:\Users\user\AppData\Local\...\saren.exe, PE32
56->102
dropped
104
3 other malicious files
56->104
dropped
186
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
56->186
188
Writes to foreign memory
regions
56->188
190
Allocates memory in
foreign processes
56->190
192
Uses threadpools to
delay analysis
56->192
72
8f2lGlV.exe
56->72
started
74
MSBuild.exe
56->74
started
78
3 other processes
56->78
file17
signatures18
process19
dnsIp20
226
Multi AV Scanner detection
for dropped file
59->226
228
Tries to evade debugger
and weak emulator (self
modifying code)
59->228
250
3 other signatures
59->250
230
Creates an undocumented
autostart registry key
62->230
80
server.exe
62->80
started
134
brolyx95.duckdns.org
176.160.157.96
BOUYGTEL-ISPFR
France
64->134
232
System process connects
to network (likely due
to code injection or
exploit)
64->232
136
stealer.cy
185.178.208.160
DDOS-GUARDRU
Russian Federation
67->136
138
127.0.0.1
unknown
unknown
67->138
106
C:\Users\user\...\cookies-copy.sqlite-shm, data
67->106
dropped
108
C:\Users\user\AppData\...\cookies-copy.sqlite, SQLite
67->108
dropped
234
Overwrites Mozilla Firefox
settings
67->234
236
Tries to steal Crypto
Currency Wallets
67->236
82
msedge.exe
67->82
started
84
conhost.exe
67->84
started
86
taskkill.exe
67->86
started
90
3 other processes
67->90
140
xx.7.4t.com
78.46.235.75
HETZNER-ASDE
Germany
72->140
238
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
72->238
240
Tries to harvest and
steal ftp login credentials
72->240
242
Tries to harvest and
steal browser information
(history, passwords,
etc)
72->242
244
Tries to harvest and
steal Bitcoin Wallet
information
72->244
142
t.me
149.154.167.99, 443, 49723
TELEGRAMRU
United Kingdom
74->142
246
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
74->246
248
Query firmware table
information (likely
to detect VMs)
74->248
88
server.exe
76->88
started
file21
signatures22
process23
process24
92
msedge.exe
82->92
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.