Threat name:
Amadey, LummaC Stealer, Xmrig
Alert
Classification:
troj.spyw.expl.evad.mine
AI detected malicious Powershell script
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Command shell drops VBS files
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Drops script or batch files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: Potential Crypto Mining Activity
Sigma detected: Schedule system process
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1668607
Sample:
random.exe
Startdate:
18/04/2025
Architecture:
WINDOWS
Score:
100
127
t.me
2->127
129
pool.hashvault.pro
2->129
131
10 other IPs or domains
2->131
149
Sigma detected: Xmrig
2->149
151
Suricata IDS alerts
for network traffic
2->151
153
Found malware configuration
2->153
155
25 other signatures
2->155
11
namez.exe
3
28
2->11
started
16
random.exe
1
2->16
started
18
svchost.exe
2->18
started
20
10 other processes
2->20
signatures3
process4
dnsIp5
137
185.215.113.59, 49700, 49701, 80
WHOLESALECONNECTIONSNL
Portugal
11->137
107
C:\Users\user\AppData\...\4b3233bd88.exe, PE32
11->107
dropped
109
C:\Users\user\AppData\...\eb176bf380.exe, PE32+
11->109
dropped
111
C:\Users\user\AppData\Local\...Dw9ZtV.exe, PE32+
11->111
dropped
115
6 other malicious files
11->115
dropped
195
Contains functionality
to start a terminal
service
11->195
197
Found strings related
to Crypto-Mining
11->197
22
cmd.exe
3
11->22
started
26
EDw9ZtV.exe
11->26
started
28
eb176bf380.exe
11->28
started
40
2 other processes
11->40
139
185.39.17.162, 49699, 49702, 80
RU-TAGNET-ASRU
Russian Federation
16->139
141
clarmodq.top
104.21.85.126, 443, 49687, 49688
CLOUDFLARENETUS
United States
16->141
113
C:\Users\...\WUQFNHB9YO3YCN7W3QU3R90H.exe, PE32
16->113
dropped
199
Detected unpacking (changes
PE section rights)
16->199
201
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
16->201
203
Query firmware table
information (likely
to detect VMs)
16->203
209
8 other signatures
16->209
30
WUQFNHB9YO3YCN7W3QU3R90H.exe
4
16->30
started
205
Changes security center
settings (notifications,
updates, antivirus,
firewall)
18->205
32
MpCmdRun.exe
18->32
started
207
Suspicious powershell
command line found
20->207
34
conhost.exe
20->34
started
36
conhost.exe
20->36
started
38
powershell.exe
20->38
started
file6
signatures7
process8
dnsIp9
97
C:\Users\user\AppData\Local\Temp\runner.vbs, ASCII
22->97
dropped
99
C:\Users\user\AppData\Local\Temp\miner.ps1, ASCII
22->99
dropped
163
Command shell drops
VBS files
22->163
165
Drops script or batch
files to the startup
folder
22->165
167
Uses schtasks.exe or
at.exe to add and modify
task schedules
22->167
43
cscript.exe
2
22->43
started
46
conhost.exe
22->46
started
169
Writes to foreign memory
regions
26->169
171
Allocates memory in
foreign processes
26->171
173
Injects a PE file into
a foreign processes
26->173
48
MSBuild.exe
26->48
started
51
MSBuild.exe
28->51
started
101
C:\Users\user\AppData\Local\...\namez.exe, PE32
30->101
dropped
175
Multi AV Scanner detection
for dropped file
30->175
177
Contains functionality
to start a terminal
service
30->177
179
Contains functionality
to inject code into
remote processes
30->179
53
namez.exe
30->53
started
55
conhost.exe
32->55
started
135
45.82.254.120
DEDIPATH-LLCUS
Russian Federation
40->135
103
C:\Users\user\AppData\Local\Temp\Win.ps1, ASCII
40->103
dropped
181
Found many strings related
to Crypto-Wallets (likely
being stolen)
40->181
57
cmd.exe
40->57
started
60
cmd.exe
40->60
started
62
5 other processes
40->62
file10
signatures11
process12
dnsIp13
183
Bypasses PowerShell
execution policy
43->183
64
powershell.exe
15
48
43->64
started
117
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
48->117
119
newzeconi.digital
104.21.60.19
CLOUDFLARENETUS
United States
48->119
185
Tries to harvest and
steal browser information
(history, passwords,
etc)
48->185
187
Tries to steal Crypto
Currency Wallets
48->187
189
Tries to steal from
password manager
48->189
121
changeaie.top
104.21.42.7
CLOUDFLARENETUS
United States
51->121
191
Multi AV Scanner detection
for dropped file
53->191
193
Contains functionality
to start a terminal
service
53->193
105
C:\Users\user\AppData\Roaming\...\HDD.bat, ASCII
57->105
dropped
69
conhost.exe
57->69
started
71
conhost.exe
60->71
started
73
schtasks.exe
60->73
started
75
conhost.exe
62->75
started
77
conhost.exe
62->77
started
79
conhost.exe
62->79
started
81
5 other processes
62->81
file14
signatures15
process16
dnsIp17
123
github.com
140.82.112.3
GITHUBUS
United States
64->123
125
objects.githubusercontent.com
185.199.109.133
FASTLYUS
Netherlands
64->125
91
C:\Users\user\AppData\Roaming\...\xmrig.exe, PE32+
64->91
dropped
93
C:\Users\user\AppData\...\WinRing0x64.sys, PE32+
64->93
dropped
95
C:\Users\user\AppData\Roaming\...\config.json, JSON
64->95
dropped
143
Sample is not signed
and drops a device driver
64->143
145
Loading BitLocker PowerShell
Module
64->145
147
Powershell drops PE
file
64->147
83
xmrig.exe
64->83
started
87
conhost.exe
64->87
started
file18
signatures19
process20
dnsIp21
133
104.251.123.89
1GSERVERSUS
United States
83->133
157
Antivirus detection
for dropped file
83->157
159
Multi AV Scanner detection
for dropped file
83->159
161
Query firmware table
information (likely
to detect VMs)
83->161
89
conhost.exe
83->89
started
signatures22
process23
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.