Threat name:
Amadey, LummaC Stealer, Xmrig
Alert
Classification:
troj.spyw.expl.evad.mine
AI detected malicious Powershell script
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Command shell drops VBS files
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Found malware configuration
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Potential Crypto Mining Activity
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1668624
Sample:
random.exe
Startdate:
18/04/2025
Architecture:
WINDOWS
Score:
100
87
zestmodp.top
2->87
89
piratetwrath.run
2->89
91
16 other IPs or domains
2->91
121
Sigma detected: Xmrig
2->121
123
Suricata IDS alerts
for network traffic
2->123
125
Found malware configuration
2->125
127
22 other signatures
2->127
11
namez.exe
3
39
2->11
started
16
random.exe
1
2->16
started
18
svchost.exe
2->18
started
20
6 other processes
2->20
signatures3
process4
dnsIp5
111
185.215.113.59, 49699, 49700, 49703
WHOLESALECONNECTIONSNL
Portugal
11->111
75
C:\Users\user\AppData\Local\...\235T1TS.exe, PE32
11->75
dropped
77
C:\Users\user\AppData\Local\...\Hmcm0Oj.exe, PE32
11->77
dropped
79
C:\Users\user\AppData\...\ff1ee53f59.exe, PE32
11->79
dropped
83
13 other malicious files
11->83
dropped
175
Contains functionality
to start a terminal
service
11->175
177
Found strings related
to Crypto-Mining
11->177
22
aZOpr5t.exe
11->22
started
25
cmd.exe
11->25
started
27
i5Kz53x.exe
11->27
started
34
5 other processes
11->34
113
185.39.17.162, 49688, 49702, 49704
RU-TAGNET-ASRU
Russian Federation
16->113
115
clarmodq.top
104.21.85.126, 443, 49681, 49682
CLOUDFLARENETUS
United States
16->115
81
C:\Users\...\L3WU2TONWS9CL9K42B9T459HUB.exe, PE32
16->81
dropped
179
Detected unpacking (changes
PE section rights)
16->179
181
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->181
183
Query firmware table
information (likely
to detect VMs)
16->183
187
6 other signatures
16->187
29
L3WU2TONWS9CL9K42B9T459HUB.exe
4
16->29
started
185
Changes security center
settings (notifications,
updates, antivirus,
firewall)
18->185
32
MpCmdRun.exe
18->32
started
117
127.0.0.1
unknown
unknown
20->117
file6
signatures7
process8
file9
143
Antivirus detection
for dropped file
22->143
145
Multi AV Scanner detection
for dropped file
22->145
147
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
22->147
167
9 other signatures
22->167
149
Command shell drops
VBS files
25->149
36
cscript.exe
25->36
started
39
conhost.exe
25->39
started
151
Writes to foreign memory
regions
27->151
153
Allocates memory in
foreign processes
27->153
155
Injects a PE file into
a foreign processes
27->155
41
MSBuild.exe
27->41
started
52
3 other processes
27->52
85
C:\Users\user\AppData\Local\...\namez.exe, PE32
29->85
dropped
157
Contains functionality
to start a terminal
service
29->157
159
Contains functionality
to inject code into
remote processes
29->159
44
namez.exe
29->44
started
46
conhost.exe
32->46
started
161
Detected unpacking (changes
PE section rights)
34->161
163
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
34->163
165
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
34->165
48
MSBuild.exe
34->48
started
50
MSBuild.exe
34->50
started
54
7 other processes
34->54
signatures10
process11
dnsIp12
129
Bypasses PowerShell
execution policy
36->129
56
powershell.exe
36->56
started
97
piratetwrath.run
104.21.48.30, 443, 49729, 49732
CLOUDFLARENETUS
United States
41->97
99
file-eu-par-1.gofile.io
202.165.69.5
VPIS-APVADSManagedBusinessInternetServiceProviderMY
Australia
41->99
101
store-na-phx-1.gofile.io
94.139.32.29
ENIX-ASFR
Belgium
41->101
131
Query firmware table
information (likely
to detect VMs)
41->131
133
Tries to harvest and
steal ftp login credentials
41->133
135
Tries to steal Crypto
Currency Wallets
41->135
137
Multi AV Scanner detection
for dropped file
44->137
139
Contains functionality
to start a terminal
service
44->139
103
t.me
149.154.167.99, 443, 49705
TELEGRAMRU
United Kingdom
48->103
105
newzeconi.digital
104.21.60.19, 443, 49706, 49708
CLOUDFLARENETUS
United States
48->105
141
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
48->141
107
zestmodp.top
104.21.32.1, 443, 49712, 49715
CLOUDFLARENETUS
United States
50->107
109
changeaie.top
172.67.197.226, 443, 49721, 49724
CLOUDFLARENETUS
United States
54->109
signatures13
process14
dnsIp15
93
github.com
140.82.112.4, 443, 49741
GITHUBUS
United States
56->93
95
objects.githubusercontent.com
185.199.110.133, 443, 49742
FASTLYUS
Netherlands
56->95
69
C:\Users\user\AppData\Roaming\...\xmrig.exe, PE32+
56->69
dropped
71
C:\Users\user\AppData\...\WinRing0x64.sys, PE32+
56->71
dropped
73
C:\Users\user\AppData\Roaming\...\config.json, JSON
56->73
dropped
169
Sample is not signed
and drops a device driver
56->169
171
Loading BitLocker PowerShell
Module
56->171
173
Powershell drops PE
file
56->173
61
xmrig.exe
56->61
started
65
conhost.exe
56->65
started
file16
signatures17
process18
dnsIp19
119
104.251.123.89
1GSERVERSUS
United States
61->119
189
Multi AV Scanner detection
for dropped file
61->189
191
Query firmware table
information (likely
to detect VMs)
61->191
193
Found strings related
to Crypto-Mining
61->193
67
conhost.exe
61->67
started
signatures20
process21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.