Threat name:
Amadey, AsyncRAT, CryptOne, DarkTortilla
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected CryptOne packer
Yara detected DarkTortilla Crypter
Yara detected LummaC Stealer
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1662403
Sample:
random.exe
Startdate:
10/04/2025
Architecture:
WINDOWS
Score:
100
163
Found malware configuration
2->163
165
Malicious sample detected
(through community Yara
rule)
2->165
167
Antivirus detection
for URL or domain
2->167
169
19 other signatures
2->169
11
random.exe
5
2->11
started
15
rapes.exe
2->15
started
17
hsubbct
2->17
started
process3
file4
115
C:\Users\user\AppData\Local\...\rapes.exe, PE32
11->115
dropped
117
C:\Users\user\...\rapes.exe:Zone.Identifier, ASCII
11->117
dropped
237
Detected unpacking (changes
PE section rights)
11->237
239
Contains functionality
to start a terminal
service
11->239
241
Tries to evade debugger
and weak emulator (self
modifying code)
11->241
243
Tries to detect virtualization
through RDTSC time measurements
11->243
19
rapes.exe
54
11->19
started
245
Hides threads from debuggers
15->245
247
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
15->247
249
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
15->249
signatures5
process6
dnsIp7
129
176.113.115.6
SELECTELRU
Russian Federation
19->129
131
176.113.115.7
SELECTELRU
Russian Federation
19->131
87
C:\Users\user\AppData\Local\...\tpEPL3n.exe, PE32+
19->87
dropped
89
C:\Users\user\AppData\Local\...\ms79Eey.exe, PE32+
19->89
dropped
91
C:\Users\user\AppData\Local\...\qhjMWht.exe, PE32
19->91
dropped
93
27 other files (26 malicious)
19->93
dropped
193
Multi AV Scanner detection
for dropped file
19->193
195
Detected unpacking (changes
PE section rights)
19->195
197
Contains functionality
to start a terminal
service
19->197
199
5 other signatures
19->199
24
WEpL8FD.exe
19->24
started
27
6aef531626.exe
19->27
started
30
e8286a50c4.exe
19->30
started
32
6 other processes
19->32
file8
signatures9
process10
file11
211
Multi AV Scanner detection
for dropped file
24->211
213
Contains functionality
to inject code into
remote processes
24->213
215
Writes to foreign memory
regions
24->215
34
MSBuild.exe
24->34
started
37
MSBuild.exe
24->37
started
119
C:\Users\user\AppData\...\svchost015.exe, PE32
27->119
dropped
217
Detected unpacking (changes
PE section rights)
27->217
219
Allocates memory in
foreign processes
27->219
221
Tries to evade debugger
and weak emulator (self
modifying code)
27->221
231
2 other signatures
27->231
39
svchost015.exe
27->39
started
223
Sample uses process
hollowing technique
30->223
233
2 other signatures
30->233
43
svchost015.exe
30->43
started
121
C:\Users\user\AppData\...\724bdd2769.tmp, PE32
32->121
dropped
225
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
32->225
227
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
32->227
229
Tries to harvest and
steal browser information
(history, passwords,
etc)
32->229
235
2 other signatures
32->235
45
MSBuild.exe
25
32->45
started
47
724bdd2769.tmp
32->47
started
49
MSBuild.exe
32->49
started
51
InstallUtil.exe
32->51
started
signatures12
process13
dnsIp14
171
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
34->171
173
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
34->173
175
Maps a DLL or memory
area into another process
34->175
191
2 other signatures
34->191
53
explorer.exe
34->53
injected
143
185.156.73.98
RELDAS-NETRU
Russian Federation
39->143
97
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
39->97
dropped
99
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
39->99
dropped
109
2 other malicious files
39->109
dropped
101
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
43->101
dropped
111
3 other malicious files
43->111
dropped
145
127.0.0.1
unknown
unknown
45->145
147
149.154.167.99
TELEGRAMRU
United Kingdom
45->147
149
78.47.105.59
HETZNER-ASDE
Germany
45->149
177
Attempt to bypass Chrome
Application-Bound Encryption
45->177
179
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
45->179
181
Tries to harvest and
steal browser information
(history, passwords,
etc)
45->181
183
Switches to a custom
stack to bypass stack
traces
45->183
58
msedge.exe
45->58
started
60
chrome.exe
45->60
started
62
msedge.exe
45->62
started
103
C:\Users\user\AppData\...\unins000.exe (copy), PE32
47->103
dropped
105
C:\Users\user\AppData\...\is-N0LR5.tmp, PE32
47->105
dropped
107
C:\Users\user\AppData\...\is-9KMKI.tmp, PE32
47->107
dropped
113
3 other malicious files
47->113
dropped
151
104.21.85.126
CLOUDFLARENETUS
United States
49->151
185
Query firmware table
information (likely
to detect VMs)
49->185
187
Tries to harvest and
steal ftp login credentials
49->187
189
Tries to steal Crypto
Currency Wallets
49->189
153
43.134.85.209
LILLY-ASUS
Japan
51->153
155
23.53.11.13
AKAMAI-ASN1EU
United States
51->155
file15
signatures16
process17
dnsIp18
133
190.92.174.36
DesarrollosDigitalesdePulsarConsultingAR
Argentina
53->133
95
C:\Users\user\AppData\Roaming\hsubbct, PE32
53->95
dropped
201
System process connects
to network (likely due
to code injection or
exploit)
53->201
203
Benign windows process
drops PE files
53->203
205
Injects code into the
Windows Explorer (explorer.exe)
53->205
209
2 other signatures
53->209
64
explorer.exe
53->64
started
67
explorer.exe
53->67
started
69
msedge.exe
53->69
started
78
2 other processes
53->78
207
Monitors registry run
keys for changes
58->207
72
chrome.exe
60->72
started
74
chrome.exe
60->74
started
76
msedge.exe
62->76
started
file19
signatures20
process21
dnsIp22
157
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
64->157
159
Tries to steal Mail
credentials (via file
/ registry access)
64->159
161
Tries to harvest and
steal browser information
(history, passwords,
etc)
64->161
135
239.255.255.250
unknown
Reserved
69->135
80
msedge.exe
69->80
started
83
msedge.exe
69->83
started
85
msedge.exe
69->85
started
137
142.250.176.206
GOOGLEUS
United States
72->137
139
142.250.80.4
GOOGLEUS
United States
72->139
141
3 other IPs or domains
72->141
signatures23
process24
dnsIp25
123
23.62.47.140
TelefonicadelPeruSAAPE
United States
80->123
125
23.62.47.173
TelefonicadelPeruSAAPE
United States
80->125
127
24 other IPs or domains
80->127
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.