Threat name:
Amadey, CryptOne, LummaC Stealer
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Costura Assembly Loader
Yara detected CryptOne packer
Yara detected Generic Stealer
Yara detected LummaC Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1677005
Sample:
random.exe
Startdate:
29/04/2025
Architecture:
WINDOWS
Score:
100
69
zenithcorde.top
2->69
71
pki-goog.l.google.com
2->71
73
6 other IPs or domains
2->73
111
Suricata IDS alerts
for network traffic
2->111
113
Found malware configuration
2->113
115
Antivirus detection
for URL or domain
2->115
117
19 other signatures
2->117
10
saved.exe
25
2->10
started
15
random.exe
1
2->15
started
17
laren.exe
2->17
started
signatures3
process4
dnsIp5
83
185.39.17.122, 49742, 49780, 80
RU-TAGNET-ASRU
Russian Federation
10->83
85
185.39.17.163, 49702, 49703, 49704
RU-TAGNET-ASRU
Russian Federation
10->85
87
94.26.90.80, 49775, 80
ASDETUKhttpwwwheficedcomGB
Bulgaria
10->87
59
C:\Users\user\AppData\...\VisualCode.exe, PE32+
10->59
dropped
61
C:\Users\user\AppData\Local\...\amnew.exe, PE32
10->61
dropped
63
C:\Users\user\AppData\Local\...\AJ2naPd.exe, PE32+
10->63
dropped
67
5 other malicious files
10->67
dropped
139
Contains functionality
to start a terminal
service
10->139
19
AJ2naPd.exe
10->19
started
22
6b882b1a70.exe
1
10->22
started
25
amnew.exe
10->25
started
27
VisualCode.exe
10->27
started
89
185.39.17.162, 49698, 49706, 49738
RU-TAGNET-ASRU
Russian Federation
15->89
91
zenithcorde.top
172.67.190.162, 443, 49691, 49692
CLOUDFLARENETUS
United States
15->91
65
C:\...\5R8ZJ7T89QVLRU22HQKB0ATBQEKE1.exe, PE32
15->65
dropped
141
Detected unpacking (changes
PE section rights)
15->141
143
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->143
145
Query firmware table
information (likely
to detect VMs)
15->145
147
9 other signatures
15->147
29
5R8ZJ7T89QVLRU22HQKB0ATBQEKE1.exe
4
15->29
started
file6
signatures7
process8
file9
119
Writes to foreign memory
regions
19->119
121
Allocates memory in
foreign processes
19->121
123
Injects a PE file into
a foreign processes
19->123
31
MSBuild.exe
3
19->31
started
53
C:\Users\user\AppData\...\svchost015.exe, PE32
22->53
dropped
125
Detected unpacking (changes
PE section rights)
22->125
127
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
22->127
129
Tries to evade debugger
and weak emulator (self
modifying code)
22->129
137
5 other signatures
22->137
35
svchost015.exe
13
22->35
started
55
C:\Users\user\AppData\Local\...\laren.exe, PE32
25->55
dropped
37
laren.exe
25->37
started
57
C:\Users\user\AppData\Local\...\saved.exe, PE32
29->57
dropped
131
Multi AV Scanner detection
for dropped file
29->131
133
Contains functionality
to start a terminal
service
29->133
135
Contains functionality
to inject code into
remote processes
29->135
39
saved.exe
29->39
started
signatures10
process11
dnsIp12
93
149.28.87.212, 49743, 49788, 7702
AS-CHOOPAUS
United States
31->93
99
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
31->99
101
Tries to steal Mail
credentials (via file
/ registry access)
31->101
103
Found many strings related
to Crypto-Wallets (likely
being stolen)
31->103
109
8 other signatures
31->109
41
chrome.exe
31->41
started
44
chrome.exe
31->44
injected
46
chrome.exe
31->46
injected
48
chrome.exe
31->48
injected
95
185.156.72.196, 80
ITDELUXE-ASRU
Russian Federation
35->95
97
drive.usercontent.google.com
172.217.12.129, 443, 49721
GOOGLEUS
United States
35->97
105
Multi AV Scanner detection
for dropped file
39->105
107
Contains functionality
to start a terminal
service
39->107
signatures13
process14
dnsIp15
81
192.168.2.5, 138, 443, 49330
unknown
unknown
41->81
50
chrome.exe
41->50
started
process16
dnsIp17
75
www.google.com
142.250.217.132, 443, 49749, 49750
GOOGLEUS
United States
50->75
77
ogads-pa.clients6.google.com
142.250.68.10, 443, 49771, 49773
GOOGLEUS
United States
50->77
79
5 other IPs or domains
50->79
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.