Threat name:
NetSupport RAT, Amadey, CryptOne, LummaC
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell drops NetSupport RAT client
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Suspicious Script Execution From Temp Folder
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected CryptOne packer
Yara detected LummaC Stealer
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1662415
Sample:
random.exe
Startdate:
10/04/2025
Architecture:
WINDOWS
Score:
100
143
Found malware configuration
2->143
145
Malicious sample detected
(through community Yara
rule)
2->145
147
Antivirus detection
for URL or domain
2->147
149
19 other signatures
2->149
9
rapes.exe
63
2->9
started
14
random.exe
1
4
2->14
started
16
futors.exe
2->16
started
18
6 other processes
2->18
process3
dnsIp4
121
176.113.115.6
SELECTELRU
Russian Federation
9->121
123
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
9->123
127
2 other IPs or domains
9->127
87
C:\Users\user\AppData\...\9c7de57a75.exe, PE32
9->87
dropped
89
C:\Users\user\AppData\Local\...\UZPt0hR.exe, PE32
9->89
dropped
91
C:\Users\user\AppData\Local\...\qhjMWht.exe, PE32
9->91
dropped
101
27 other malicious files
9->101
dropped
225
Contains functionality
to start a terminal
service
9->225
227
Hides threads from debuggers
9->227
229
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
9->229
20
WEpL8FD.exe
9->20
started
23
powershell.exe
9->23
started
26
oqjbSNf.exe
9->26
started
32
2 other processes
9->32
93
C:\Users\user\AppData\Local\...\d9g42.exe, PE32
14->93
dropped
95
C:\Users\user\AppData\Local\...\3n53T.exe, PE32+
14->95
dropped
28
d9g42.exe
1
4
14->28
started
125
185.215.113.209
WHOLESALECONNECTIONSNL
Portugal
16->125
97
C:\Users\user\AppData\...\dc5294214c.exe, PE32
16->97
dropped
99
C:\Users\user\AppData\...\a979193115.exe, PE32
16->99
dropped
103
2 other malicious files
16->103
dropped
231
Creates multiple autostart
registry keys
16->231
30
a979193115.exe
16->30
started
233
Query firmware table
information (likely
to detect VMs)
18->233
235
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
18->235
file5
signatures6
process7
file8
177
Contains functionality
to inject code into
remote processes
20->177
179
Writes to foreign memory
regions
20->179
181
Allocates memory in
foreign processes
20->181
34
MSBuild.exe
20->34
started
37
MSBuild.exe
20->37
started
71
C:\Users\user\AppData\...\remcmdstub.exe, PE32
23->71
dropped
73
C:\Users\user\AppData\Roaming\...\pcicapi.DLL, PE32
23->73
dropped
75
C:\Users\user\AppData\...\msvcr100.dll, PE32
23->75
dropped
85
7 other malicious files
23->85
dropped
183
Creates multiple autostart
registry keys
23->183
185
Found suspicious powershell
code related to unpacking
or dynamic code loading
23->185
199
2 other signatures
23->199
39
AdBlock.exe
23->39
started
42
conhost.exe
23->42
started
187
Injects a PE file into
a foreign processes
26->187
44
MSBuild.exe
26->44
started
77
C:\Users\user\AppData\Local\...\2Q7356.exe, PE32
28->77
dropped
79
C:\Users\user\AppData\Local\...\1S39z3.exe, PE32
28->79
dropped
189
Multi AV Scanner detection
for dropped file
28->189
46
1S39z3.exe
4
28->46
started
49
2Q7356.exe
1
28->49
started
81
C:\Users\user\AppData\...\svchost015.exe, PE32
30->81
dropped
191
Detected unpacking (changes
PE section rights)
30->191
193
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
30->193
195
Tries to evade debugger
and weak emulator (self
modifying code)
30->195
201
4 other signatures
30->201
83
C:\Users\user\AppData\Local\...\futors.exe, PE32
32->83
dropped
197
Antivirus detection
for dropped file
32->197
51
futors.exe
32->51
started
signatures9
process10
dnsIp11
151
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
34->151
171
4 other signatures
34->171
53
explorer.exe
34->53
injected
153
Switches to a custom
stack to bypass stack
traces
37->153
113
178.32.90.245
OVHFR
France
39->113
115
172.67.68.212
CLOUDFLARENETUS
United States
39->115
173
3 other signatures
39->173
117
104.21.85.96
CLOUDFLARENETUS
United States
44->117
155
Tries to harvest and
steal ftp login credentials
44->155
175
2 other signatures
44->175
105
C:\Users\user\AppData\Local\...\rapes.exe, PE32
46->105
dropped
157
Multi AV Scanner detection
for dropped file
46->157
159
Detected unpacking (changes
PE section rights)
46->159
161
Contains functionality
to start a terminal
service
46->161
163
Tries to detect virtualization
through RDTSC time measurements
46->163
58
rapes.exe
46->58
started
119
172.67.205.184
CLOUDFLARENETUS
United States
49->119
107
C:\Users\...\Y606LYDA0NG3YN5CDKGUK7SDS.exe, PE32
49->107
dropped
165
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
49->165
167
Query firmware table
information (likely
to detect VMs)
49->167
169
Tries to evade debugger
and weak emulator (self
modifying code)
49->169
60
Y606LYDA0NG3YN5CDKGUK7SDS.exe
49->60
started
62
WerFault.exe
49->62
started
file12
signatures13
process14
dnsIp15
109
190.92.174.36
DesarrollosDigitalesdePulsarConsultingAR
Argentina
53->109
69
C:\Users\user\AppData\Roaming\ciswihg, PE32
53->69
dropped
203
System process connects
to network (likely due
to code injection or
exploit)
53->203
205
Benign windows process
drops PE files
53->205
207
Injects code into the
Windows Explorer (explorer.exe)
53->207
223
2 other signatures
53->223
64
AdBlock.exe
53->64
started
67
explorer.exe
53->67
started
209
Multi AV Scanner detection
for dropped file
58->209
211
Detected unpacking (changes
PE section rights)
58->211
213
Contains functionality
to start a terminal
service
58->213
215
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
58->215
217
Tries to evade debugger
and weak emulator (self
modifying code)
60->217
219
Hides threads from debuggers
60->219
221
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
60->221
111
20.189.173.21
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
62->111
file16
signatures17
process18
signatures19
129
Query firmware table
information (likely
to detect VMs)
64->129
131
Hides threads from debuggers
64->131
133
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
64->133
135
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
64->135
137
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
67->137
139
Tries to steal Mail
credentials (via file
/ registry access)
67->139
141
Tries to harvest and
steal browser information
(history, passwords,
etc)
67->141
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.