Threat name:
Amadey, LummaC Stealer, PrivateLoader, X
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Drops PE files to the document folder of the user
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1667165
Sample:
random.exe
Startdate:
17/04/2025
Architecture:
WINDOWS
Score:
100
125
zestmodp.top
2->125
127
skippps.com
2->127
129
12 other IPs or domains
2->129
151
Sigma detected: Xmrig
2->151
153
Suricata IDS alerts
for network traffic
2->153
155
Found malware configuration
2->155
157
26 other signatures
2->157
11
namez.exe
48
2->11
started
16
random.exe
1
2->16
started
18
0000003c0029.exe
2->18
started
20
3 other processes
2->20
signatures3
process4
dnsIp5
141
185.215.113.59, 49730, 49731, 80
WHOLESALECONNECTIONSNL
Portugal
11->141
143
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
11->143
115
C:\Users\user\AppData\...\7a82497e42.exe, PE32
11->115
dropped
117
C:\Users\user\AppData\Local\...\amnew.exe, PE32
11->117
dropped
119
C:\Users\user\AppData\Local\...\235T1TS.exe, PE32
11->119
dropped
123
22 other malicious files
11->123
dropped
217
Contains functionality
to start a terminal
service
11->217
22
07jGt0K.exe
11->22
started
26
zdZK6Nx.exe
2
7
11->26
started
28
xsRMYho.exe
11->28
started
38
5 other processes
11->38
145
185.39.17.162, 49727, 49732, 80
RU-TAGNET-ASRU
Russian Federation
16->145
147
clarmodq.top
172.67.205.184, 443, 49715, 49717
CLOUDFLARENETUS
United States
16->147
121
C:\Users\...\5TKTD1PJMPSVS0YAEHYANWHQEER.exe, PE32
16->121
dropped
219
Detected unpacking (changes
PE section rights)
16->219
221
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->221
223
Query firmware table
information (likely
to detect VMs)
16->223
231
8 other signatures
16->231
30
5TKTD1PJMPSVS0YAEHYANWHQEER.exe
4
16->30
started
225
Modifies the context
of a thread in another
process (thread injection)
18->225
227
Injects a PE file into
a foreign processes
18->227
229
Found direct / indirect
Syscall (likely to bypass
EDR)
18->229
32
0000003c0029.exe
18->32
started
34
conhost.exe
20->34
started
36
0000003c0029.exe
20->36
started
file6
signatures7
process8
dnsIp9
103
C:\Users\user\Documents\...\0000003c0029.exe, PE32+
22->103
dropped
159
Multi AV Scanner detection
for dropped file
22->159
161
Suspicious powershell
command line found
22->161
163
Drops PE files to the
document folder of the
user
22->163
165
Adds a directory exclusion
to Windows Defender
22->165
41
0000003c0029.exe
22->41
started
44
powershell.exe
22->44
started
46
conhost.exe
22->46
started
105
C:\Users\user\AppData\Local\...\vcl120.bpl, PE32
26->105
dropped
107
C:\Users\user\AppData\Local\...\rtl120.bpl, PE32
26->107
dropped
109
C:\Users\user\AppData\Local\...\ContSo.exe, PE32
26->109
dropped
167
Switches to a custom
stack to bypass stack
traces
26->167
48
ContSo.exe
6
26->48
started
183
3 other signatures
28->183
51
MSBuild.exe
28->51
started
111
C:\Users\user\AppData\Local\...\namez.exe, PE32
30->111
dropped
169
Contains functionality
to start a terminal
service
30->169
171
Contains functionality
to inject code into
remote processes
30->171
54
namez.exe
30->54
started
173
Found many strings related
to Crypto-Wallets (likely
being stolen)
32->173
139
zestmodp.top
104.21.16.1
CLOUDFLARENETUS
United States
38->139
175
Antivirus detection
for dropped file
38->175
177
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
38->177
179
Tries to harvest and
steal browser information
(history, passwords,
etc)
38->179
181
Tries to steal Crypto
Currency Wallets
38->181
56
MSBuild.exe
38->56
started
58
MSBuild.exe
38->58
started
60
MSBuild.exe
38->60
started
file10
signatures11
process12
dnsIp13
185
Multi AV Scanner detection
for dropped file
41->185
187
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
41->187
189
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
41->189
207
3 other signatures
41->207
62
0000003c0029.exe
41->62
started
191
Loading BitLocker PowerShell
Module
44->191
66
conhost.exe
44->66
started
68
WmiPrvSE.exe
44->68
started
97
C:\ProgramData\HttpNotepadMV_v5\vcl120.bpl, PE32
48->97
dropped
99
C:\ProgramData\HttpNotepadMV_v5\rtl120.bpl, PE32
48->99
dropped
101
C:\ProgramData\HttpNotepadMV_v5\ContSo.exe, PE32
48->101
dropped
193
Switches to a custom
stack to bypass stack
traces
48->193
70
ContSo.exe
3
48->70
started
133
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
51->133
135
bardcauft.run
104.21.45.199
CLOUDFLARENETUS
United States
51->135
195
Query firmware table
information (likely
to detect VMs)
51->195
197
Tries to harvest and
steal ftp login credentials
51->197
199
Tries to harvest and
steal browser information
(history, passwords,
etc)
51->199
201
Contains functionality
to start a terminal
service
54->201
137
changeaie.top
172.67.197.226
CLOUDFLARENETUS
United States
56->137
203
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
56->203
205
Tries to steal Crypto
Currency Wallets
56->205
file14
signatures15
process16
dnsIp17
149
skippps.com
196.251.81.64
SONIC-WirelessZA
Seychelles
62->149
233
Writes to foreign memory
regions
62->233
235
Modifies the context
of a thread in another
process (thread injection)
62->235
237
Injects a PE file into
a foreign processes
62->237
73
AddInProcess.exe
62->73
started
76
AddInProcess.exe
62->76
started
78
AddInProcess.exe
62->78
started
80
AddInProcess.exe
62->80
started
113
C:\Users\user\AppData\...\vngkynldwnprlt, PE32
70->113
dropped
239
Found hidden mapped
module (file has been
removed from disk)
70->239
241
Maps a DLL or memory
area into another process
70->241
243
Switches to a custom
stack to bypass stack
traces
70->243
82
certutil.exe
70->82
started
85
cmd.exe
70->85
started
file18
signatures19
process20
dnsIp21
209
Found strings related
to Crypto-Mining
73->209
87
conhost.exe
73->87
started
89
conhost.exe
76->89
started
91
conhost.exe
78->91
started
93
conhost.exe
80->93
started
131
185.183.32.103
WORLDSTREAMNL
Netherlands
82->131
211
System process connects
to network (likely due
to code injection or
exploit)
82->211
213
Query firmware table
information (likely
to detect VMs)
82->213
215
Switches to a custom
stack to bypass stack
traces
82->215
95
conhost.exe
85->95
started
signatures22
process23
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.