Threat name:
Amadey, LummaC Stealer, ResolverRAT
Alert
Classification:
phis.troj.spyw.expl.evad
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Command shell drops VBS files
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PowerShell case anomaly found
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected ResolverRAT
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1696200
Sample:
random.exe
Startdate:
21/05/2025
Architecture:
WINDOWS
Score:
100
135
quaterujrb.shop
2->135
137
narrathfpt.top
2->137
139
8 other IPs or domains
2->139
173
Suricata IDS alerts
for network traffic
2->173
175
Found malware configuration
2->175
177
Malicious sample detected
(through community Yara
rule)
2->177
179
35 other signatures
2->179
12
ramez.exe
40
2->12
started
17
random.exe
1
2->17
started
19
wscript.exe
2->19
started
21
3 other processes
2->21
signatures3
process4
dnsIp5
157
185.156.72.96, 49717, 49722, 49725
ITDELUXE-ASRU
Russian Federation
12->157
159
counterstrike2cheats.com
172.67.188.15
CLOUDFLARENETUS
United States
12->159
115
C:\Users\user\AppData\Local\...\jybaWhF.exe, PE32
12->115
dropped
117
C:\Users\user\AppData\Local\...\f9zLXGi.exe, PE32+
12->117
dropped
119
C:\Users\user\AppData\Local\...\f3nl6km.exe, PE32
12->119
dropped
123
13 other malicious files
12->123
dropped
215
Contains functionality
to start a terminal
service
12->215
23
cmd.exe
12->23
started
26
08IyOOF.exe
12->26
started
28
f3nl6km.exe
12->28
started
39
6 other processes
12->39
121
C:\Users\user\AppData\Local\...\8ziV0QZmV.hta, HTML
17->121
dropped
217
Binary is likely a compiled
AutoIt script file
17->217
219
Found API chain indicative
of sandbox detection
17->219
221
Creates HTA files
17->221
31
mshta.exe
1
17->31
started
33
cmd.exe
1
17->33
started
223
Wscript starts Powershell
(via cmd or directly)
19->223
225
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
19->225
227
Suspicious execution
chain found
19->227
35
cmd.exe
19->35
started
229
Suspicious powershell
command line found
21->229
231
Found many strings related
to Crypto-Wallets (likely
being stolen)
21->231
233
Tries to download and
execute files (via powershell)
21->233
37
powershell.exe
14
16
21->37
started
file6
signatures7
process8
dnsIp9
189
Wscript starts Powershell
(via cmd or directly)
23->189
41
powershell.exe
23->41
started
43
conhost.exe
23->43
started
191
Multi AV Scanner detection
for dropped file
26->191
203
3 other signatures
26->203
50
2 other processes
26->50
161
188.37.160.41, 49768, 7710
VODAFONE-PTVodafonePortugalPT
Portugal
28->161
193
Antivirus detection
for dropped file
28->193
195
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
28->195
205
4 other signatures
28->205
52
3 other processes
28->52
207
2 other signatures
31->207
45
powershell.exe
15
19
31->45
started
209
4 other signatures
33->209
54
2 other processes
33->54
197
Adds a directory exclusion
to Windows Defender
35->197
56
2 other processes
35->56
211
2 other signatures
37->211
58
2 other processes
37->58
163
176.65.141.36, 49758, 56001
WEBTRAFFICDE
Germany
39->163
165
2.58.56.228, 49793, 8081
SOFTNET-ASInternetServiceProviderinSloveniaandSouthE
Netherlands
39->165
199
Detected unpacking (changes
PE section rights)
39->199
201
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
39->201
213
10 other signatures
39->213
60
7 other processes
39->60
signatures10
process11
dnsIp12
62
cmd.exe
41->62
started
167
185.156.72.2, 49715, 49716, 49741
ITDELUXE-ASRU
Russian Federation
45->167
125
TempCNQHP2TYXMUZYIKAXPFWQ3OPDTQSXDKN.EXE, PE32
45->125
dropped
235
Obfuscated command line
found
45->235
237
Contains functionality
to start a terminal
service
45->237
239
Found many strings related
to Crypto-Wallets (likely
being stolen)
45->239
253
2 other signatures
45->253
66
TempCNQHP2TYXMUZYIKAXPFWQ3OPDTQSXDKN.EXE
4
45->66
started
68
conhost.exe
45->68
started
169
narrathfpt.top
172.67.222.194, 443, 49757, 49759
CLOUDFLARENETUS
United States
50->169
241
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
50->241
243
Query firmware table
information (likely
to detect VMs)
50->243
245
Tries to harvest and
steal ftp login credentials
50->245
255
3 other signatures
50->255
171
192.168.2.4, 443, 49708, 49715
unknown
unknown
52->171
70
chrome.exe
52->70
started
73
cmd.exe
56->73
started
247
Suspicious powershell
command line found
60->247
249
Wscript starts Powershell
(via cmd or directly)
60->249
251
Adds a directory exclusion
to Windows Defender
60->251
75
powershell.exe
60->75
started
77
powershell.exe
60->77
started
79
cmd.exe
60->79
started
81
WMIC.exe
60->81
started
file13
signatures14
process15
dnsIp16
127
C:\ProgramData\Windows\bootloader.vbs, ASCII
62->127
dropped
129
C:\ProgramData\Windows\Windows64x.bat, DOS
62->129
dropped
257
Suspicious powershell
command line found
62->257
259
Wscript starts Powershell
(via cmd or directly)
62->259
261
Command shell drops
VBS files
62->261
83
powershell.exe
62->83
started
88
powershell.exe
62->88
started
90
powershell.exe
62->90
started
102
10 other processes
62->102
131
C:\Users\user\AppData\Local\...\ramez.exe, PE32
66->131
dropped
263
Multi AV Scanner detection
for dropped file
66->263
265
Contains functionality
to start a terminal
service
66->265
267
Contains functionality
to inject code into
remote processes
66->267
92
ramez.exe
66->92
started
94
conhost.exe
68->94
started
149
clients2.googleusercontent.com
70->149
151
beacons.gcp.gvt2.com
70->151
155
3 other IPs or domains
70->155
96
conhost.exe
73->96
started
153
79.137.204.48
PSKSET-ASRU
Russian Federation
75->153
133
C:\Users\user\AppData\...\ldnlqbsiwnw.exe, PE32+
75->133
dropped
269
Loading BitLocker PowerShell
Module
77->269
98
WmiPrvSE.exe
77->98
started
100
conhost.exe
79->100
started
file17
signatures18
process19
dnsIp20
141
194.59.31.36
COMBAHTONcombahtonGmbHDE
Germany
83->141
143
ipwho.is
108.181.47.111
ASN852CA
Canada
83->143
109
C:\Users\user\AppData\...\t5kx10xj.cmdline, Unicode
83->109
dropped
181
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
83->181
104
csc.exe
83->104
started
183
Loading BitLocker PowerShell
Module
88->183
111
C:\ProgramData\Windows\boot64x.w, ASCII
90->111
dropped
185
Multi AV Scanner detection
for dropped file
92->185
187
Contains functionality
to start a terminal
service
92->187
145
payguard.fun
185.254.96.157, 443, 49746, 49754
AVORODE
Germany
102->145
147
127.0.0.1
unknown
unknown
102->147
file21
signatures22
process23
file24
113
C:\Users\user\AppData\Local\...\t5kx10xj.dll, PE32
104->113
dropped
107
cvtres.exe
104->107
started
process25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.