Threat name:
Amadey, LummaC Stealer, ResolverRAT, Xmr
Alert
Classification:
troj.spyw.expl.evad.mine
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops VBS files to the startup folder
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Drops script at startup location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses the Telegram API (likely for C&C communication)
Uses threadpools to delay analysis
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PersistenceViaHiddenTask
Yara detected ResolverRAT
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1707932
Sample:
random.exe
Startdate:
06/06/2025
Architecture:
WINDOWS
Score:
100
102
api.telegram.org
2->102
104
waxnps.live
2->104
106
17 other IPs or domains
2->106
120
Suricata IDS alerts
for network traffic
2->120
122
Found malware configuration
2->122
124
Antivirus detection
for dropped file
2->124
128
25 other signatures
2->128
10
ramez.exe
49
2->10
started
15
random.exe
1
2->15
started
17
wscript.exe
2->17
started
19
15 other processes
2->19
signatures3
126
Uses the Telegram API
(likely for C&C
communication)
102->126
process4
dnsIp5
110
185.156.72.61, 49708, 80
ITDELUXE-ASRU
Russian Federation
10->110
112
185.156.72.96, 49697, 49699, 49701
ITDELUXE-ASRU
Russian Federation
10->112
84
C:\Users\user\AppData\Local\...\QzeKOIS.exe, PE32+
10->84
dropped
86
C:\Users\user\AppData\Local\...\JExAdRN.exe, PE32
10->86
dropped
88
C:\Users\user\AppData\Local\...\DgO51N6.exe, PE32+
10->88
dropped
92
21 other malicious files
10->92
dropped
180
Hides threads from debuggers
10->180
21
t3u2Imz.exe
10->21
started
24
08IyOOF.exe
10->24
started
26
MrTl1m2.exe
10->26
started
38
6 other processes
10->38
114
185.156.72.2, 49689, 49700, 49702
ITDELUXE-ASRU
Russian Federation
15->114
116
waxnps.live
195.82.147.188, 443, 49681, 49682
DREAMTORRENT-CORP-ASRU
Russian Federation
15->116
90
C:\Users\user\...\FZD5KFQZ2GM90S6E3.exe, PE32
15->90
dropped
182
Detected unpacking (changes
PE section rights)
15->182
184
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->184
186
Query firmware table
information (likely
to detect VMs)
15->186
198
7 other signatures
15->198
29
FZD5KFQZ2GM90S6E3.exe
4
15->29
started
188
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
17->188
190
Suspicious execution
chain found
17->190
31
AceFlags.exe
17->31
started
118
127.0.0.1
unknown
unknown
19->118
192
Multi AV Scanner detection
for dropped file
19->192
194
Contains functionality
to start a terminal
service
19->194
196
Changes security center
settings (notifications,
updates, antivirus,
firewall)
19->196
200
7 other signatures
19->200
33
MSBuild.exe
19->33
started
36
MpCmdRun.exe
19->36
started
40
5 other processes
19->40
file6
signatures7
process8
dnsIp9
130
Multi AV Scanner detection
for dropped file
21->130
148
2 other signatures
21->148
42
MSBuild.exe
21->42
started
45
conhost.exe
21->45
started
132
Injects a PE file into
a foreign processes
24->132
47
MSBuild.exe
24->47
started
49
conhost.exe
24->49
started
68
C:\Users\user\AppData\...lementType.exe, PE32+
26->68
dropped
70
C:\Users\user\AppData\Roaming\AceFlags.exe, PE32+
26->70
dropped
72
C:\Users\user\AppData\...\AceFlags.vbs, ASCII
26->72
dropped
134
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->134
136
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
26->136
138
Drops VBS files to the
startup folder
26->138
140
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
26->140
74
C:\Users\user\AppData\Local\...\ramez.exe, PE32
29->74
dropped
142
Detected unpacking (changes
PE section rights)
29->142
144
Contains functionality
to start a terminal
service
29->144
150
3 other signatures
29->150
51
ramez.exe
29->51
started
152
2 other signatures
31->152
53
RegAsm.exe
31->53
started
94
196.251.87.178, 39001, 49714
SONIC-WirelessZA
Seychelles
33->94
55
conhost.exe
36->55
started
96
ip-api.com
208.95.112.1
TUT-ASUS
United States
38->96
98
185.156.72.196, 49709, 49717, 80
ITDELUXE-ASRU
Russian Federation
38->98
100
drive.usercontent.google.com
142.250.113.132, 443, 49705
GOOGLEUS
United States
38->100
76
C:\Users\user\AppData\Roaming\updater.exe, PE32+
38->76
dropped
78
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
38->78
dropped
80
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
38->80
dropped
82
4 other malicious files
38->82
dropped
146
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
38->146
154
4 other signatures
38->154
57
MSBuild.exe
38->57
started
60
4 other processes
38->60
file10
signatures11
process12
dnsIp13
156
Query firmware table
information (likely
to detect VMs)
42->156
158
Tries to harvest and
steal ftp login credentials
42->158
160
Tries to harvest and
steal browser information
(history, passwords,
etc)
42->160
162
Tries to steal from
password manager
42->162
164
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
47->164
166
Found many strings related
to Crypto-Wallets (likely
being stolen)
47->166
168
Tries to steal Crypto
Currency Wallets
47->168
170
Detected unpacking (changes
PE section rights)
51->170
172
Contains functionality
to start a terminal
service
51->172
174
Found stalling execution
ending in API Sleep
call
51->174
176
Hides threads from debuggers
51->176
108
t.me
149.154.167.99, 443, 49720
TELEGRAMRU
United Kingdom
57->108
178
Multi AV Scanner detection
for dropped file
60->178
62
cmd.exe
60->62
started
64
conhost.exe
60->64
started
signatures14
process15
process16
66
conhost.exe
62->66
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.