Threat name:
Amadey, Clipboard Hijacker, Go Stealer, , LummaC Stealer
Alert
Classification:
phis.troj.spyw.expl.evad.mine
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites Mozilla Firefox settings
PE file contains section with special chars
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspect Svchost Activity
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Clipboard Hijacker
Yara detected LummaC Stealer
Yara detected Pentagon Stealer
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1707337
Sample:
ERSNFfY9lD.exe
Startdate:
05/06/2025
Architecture:
WINDOWS
Score:
100
111
heartokait.digital
2->111
113
fleurdcuyt.digital
2->113
115
13 other IPs or domains
2->115
147
Suricata IDS alerts
for network traffic
2->147
149
Found malware configuration
2->149
151
Malicious sample detected
(through community Yara
rule)
2->151
153
25 other signatures
2->153
10
ramez.exe
1
52
2->10
started
15
ERSNFfY9lD.exe
1
2->15
started
17
8979cbc52f.exe
2->17
started
19
4 other processes
2->19
signatures3
process4
dnsIp5
131
185.156.72.61
ITDELUXE-ASRU
Russian Federation
10->131
133
185.156.72.96, 49729, 49730, 49732
ITDELUXE-ASRU
Russian Federation
10->133
101
C:\Users\user\AppData\...\2b4dc46660.exe, PE32+
10->101
dropped
103
C:\Users\user\AppData\Local\...\8f2lGlV.exe, PE32
10->103
dropped
105
C:\Users\user\AppData\Local\...\amnew.exe, PE32
10->105
dropped
109
23 other malicious files
10->109
dropped
207
Contains functionality
to start a terminal
service
10->207
209
Creates multiple autostart
registry keys
10->209
211
Hides threads from debuggers
10->211
21
BxwOjsy.exe
10->21
started
25
8979cbc52f.exe
10->25
started
27
sGe7ljJ.exe
10->27
started
35
8 other processes
10->35
135
185.156.72.2, 49728, 49731, 49734
ITDELUXE-ASRU
Russian Federation
15->135
137
heartokait.digital
195.82.147.188, 443, 49718, 49719
DREAMTORRENT-CORP-ASRU
Russian Federation
15->137
107
C:\Users\...\V2SZ3PMXSX121YKLI34RLQIX8E.exe, PE32
15->107
dropped
213
Detected unpacking (changes
PE section rights)
15->213
215
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->215
217
Query firmware table
information (likely
to detect VMs)
15->217
225
3 other signatures
15->225
29
V2SZ3PMXSX121YKLI34RLQIX8E.exe
4
15->29
started
219
Tries to steal Crypto
Currency Wallets
17->219
221
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->221
223
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->223
31
chrome.exe
17->31
started
33
chrome.exe
17->33
started
37
2 other processes
17->37
39
2 other processes
19->39
file6
signatures7
process8
file9
83
C:\Users\user\AppData\Local\Temp\...\2.exe, PE32
21->83
dropped
85
C:\Users\user\AppData\Local\Temp\...\1.exe, PE32+
21->85
dropped
155
Multi AV Scanner detection
for dropped file
21->155
157
Found many strings related
to Crypto-Wallets (likely
being stolen)
21->157
159
Found Tor onion address
21->159
41
1.exe
21->41
started
46
2.exe
21->46
started
87
C:\Users\...\ALSUPXJM0O17W13W63NU3VJBKU.exe, PE32
25->87
dropped
161
Antivirus detection
for dropped file
25->161
163
Detected unpacking (changes
PE section rights)
25->163
165
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
25->165
173
8 other signatures
25->173
48
ALSUPXJM0O17W13W63NU3VJBKU.exe
25->48
started
175
3 other signatures
27->175
50
MSBuild.exe
27->50
started
52
conhost.exe
27->52
started
89
C:\Users\user\AppData\Local\...\ramez.exe, PE32
29->89
dropped
167
Contains functionality
to start a terminal
service
29->167
177
2 other signatures
29->177
54
ramez.exe
29->54
started
56
chrome.exe
31->56
started
58
chrome.exe
33->58
started
91
C:\Users\user\AppData\Local\...\varen.exe, PE32
35->91
dropped
169
Early bird code injection
technique detected
35->169
171
Found strings related
to Crypto-Mining
35->171
179
4 other signatures
35->179
60
13 other processes
35->60
signatures10
process11
dnsIp12
125
2 other IPs or domains
41->125
95
C:\Users\user\...\cookies-copy.sqlite-shm, data
41->95
dropped
97
C:\Users\user\AppData\...\cookies-copy.sqlite, SQLite
41->97
dropped
181
Attempt to bypass Chrome
Application-Bound Encryption
41->181
201
3 other signatures
41->201
62
chrome.exe
41->62
started
65
msedge.exe
41->65
started
67
conhost.exe
41->67
started
74
4 other processes
41->74
99
C:\Users\user\AppData\...\cns5ehd1.cmdline, Unicode
46->99
dropped
203
4 other signatures
46->203
69
csc.exe
46->69
started
72
conhost.exe
46->72
started
183
Antivirus detection
for dropped file
48->183
185
Hides threads from debuggers
48->185
187
Query firmware table
information (likely
to detect VMs)
50->187
205
3 other signatures
50->205
189
Detected unpacking (changes
PE section rights)
54->189
191
Contains functionality
to start a terminal
service
54->191
193
Found stalling execution
ending in API Sleep
call
54->193
117
142.250.114.105
GOOGLEUS
United States
56->117
127
3 other IPs or domains
56->127
119
142.250.114.104
GOOGLEUS
United States
58->119
129
3 other IPs or domains
58->129
121
t.me
149.154.167.99, 443, 49733
TELEGRAMRU
United Kingdom
60->121
123
23.95.245.178
AS-COLOCROSSINGUS
United States
60->123
195
Multi AV Scanner detection
for dropped file
60->195
197
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
60->197
199
Tries to steal Crypto
Currency Wallets
60->199
file13
signatures14
process15
dnsIp16
145
192.168.2.4, 443, 49711, 49718
unknown
unknown
62->145
76
chrome.exe
62->76
started
79
msedge.exe
65->79
started
93
C:\Users\user\AppData\Local\...\cns5ehd1.dll, PE32
69->93
dropped
81
cvtres.exe
69->81
started
file17
process18
dnsIp19
139
www.google.com
142.251.186.103, 443, 49755, 49756
GOOGLEUS
United States
76->139
141
plus.l.google.com
76->141
143
3 other IPs or domains
76->143
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.