Threat name:
Amadey, LummaC Stealer, ResolverRAT, Vid
Alert
Classification:
troj.spyw.expl.evad.mine
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Drops VBS files to the startup folder
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses threadpools to delay analysis
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell decode and execute
Yara detected ResolverRAT
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1707367
Sample:
random.exe
Startdate:
05/06/2025
Architecture:
WINDOWS
Score:
100
116
fleurdcuyt.digital
2->116
118
51.e2.4t.com
2->118
120
12 other IPs or domains
2->120
142
Sigma detected: Xmrig
2->142
144
Suricata IDS alerts
for network traffic
2->144
146
Found malware configuration
2->146
148
26 other signatures
2->148
10
ramez.exe
48
2->10
started
15
random.exe
1
2->15
started
17
wscript.exe
2->17
started
19
2 other processes
2->19
signatures3
process4
dnsIp5
134
185.156.72.61, 49735, 80
ITDELUXE-ASRU
Russian Federation
10->134
136
185.156.72.96, 49715, 49716, 49718
ITDELUXE-ASRU
Russian Federation
10->136
106
C:\Users\user\AppData\Local\...\08IyOOF.exe, PE32+
10->106
dropped
108
C:\Users\user\AppData\Local\...\DgO51N6.exe, PE32+
10->108
dropped
110
C:\Users\user\AppData\Local\...\3Svu0S9.exe, PE32
10->110
dropped
114
22 other malicious files
10->114
dropped
206
Contains functionality
to start a terminal
service
10->206
208
Hides threads from debuggers
10->208
21
hJ5bmFj.exe
4
10->21
started
25
94mG4Ak.exe
10->25
started
27
8f2lGlV.exe
10->27
started
37
5 other processes
10->37
138
185.156.72.2, 49714, 49717, 49720
ITDELUXE-ASRU
Russian Federation
15->138
140
fleurdcuyt.digital
195.82.147.188, 443, 49698, 49701
DREAMTORRENT-CORP-ASRU
Russian Federation
15->140
112
C:\Users\user\...behaviorgraphJNOKUX46ME9RWOV0QX.exe, PE32
15->112
dropped
210
Detected unpacking (changes
PE section rights)
15->210
212
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->212
214
Query firmware table
information (likely
to detect VMs)
15->214
222
7 other signatures
15->222
29
GJNOKUX46ME9RWOV0QX.exe
4
15->29
started
216
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
17->216
31
SortId.exe
17->31
started
218
Compiles code for process
injection (via .Net
compiler)
19->218
220
Loading BitLocker PowerShell
Module
19->220
33
conhost.exe
19->33
started
35
WmiPrvSE.exe
19->35
started
file6
signatures7
process8
file9
98
C:\Users\user\AppData\Roaming\SortId.exe, PE32+
21->98
dropped
100
C:\Users\user\AppData\Roaming\...\SortId.vbs, ASCII
21->100
dropped
150
Found many strings related
to Crypto-Wallets (likely
being stolen)
21->150
152
Drops VBS files to the
startup folder
21->152
154
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
21->154
39
InstallUtil.exe
2
21->39
started
156
Multi AV Scanner detection
for dropped file
25->156
168
2 other signatures
25->168
43
MSBuild.exe
25->43
started
45
conhost.exe
25->45
started
170
3 other signatures
27->170
47
8f2lGlV.exe
27->47
started
102
C:\Users\user\AppData\Local\...\ramez.exe, PE32
29->102
dropped
158
Antivirus detection
for dropped file
29->158
160
Detected unpacking (changes
PE section rights)
29->160
162
Contains functionality
to start a terminal
service
29->162
172
3 other signatures
29->172
49
ramez.exe
29->49
started
164
Modifies the context
of a thread in another
process (thread injection)
31->164
51
InstallUtil.exe
31->51
started
104
C:\Users\user\AppData\Local\...\varen.exe, PE32
37->104
dropped
166
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
37->166
174
3 other signatures
37->174
53
MSBuild.exe
37->53
started
55
varen.exe
37->55
started
57
2 other processes
37->57
signatures10
process11
dnsIp12
124
135.125.240.74, 39001, 49301, 49719
AVAYAUS
United States
39->124
126
github.com
140.82.113.4, 443, 49723
GITHUBUS
United States
39->126
132
2 other IPs or domains
39->132
176
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
39->176
200
3 other signatures
39->200
59
AddInProcess.exe
39->59
started
62
AddInProcess.exe
39->62
started
64
AddInProcess.exe
39->64
started
73
4 other processes
39->73
178
Query firmware table
information (likely
to detect VMs)
43->178
180
Tries to harvest and
steal ftp login credentials
43->180
182
Tries to harvest and
steal browser information
(history, passwords,
etc)
43->182
184
Tries to steal from
password manager
43->184
128
51.e2.4t.com
116.202.3.169, 443, 49758, 49762
HETZNER-ASDE
Germany
47->128
130
t.me
149.154.167.99, 443, 49756
TELEGRAMRU
United Kingdom
47->130
186
Encrypted powershell
cmdline option found
47->186
66
powershell.exe
47->66
started
69
chrome.exe
47->69
started
71
powershell.exe
47->71
started
75
3 other processes
47->75
188
Detected unpacking (changes
PE section rights)
49->188
190
Contains functionality
to start a terminal
service
49->190
192
Hides threads from debuggers
49->192
194
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
53->194
196
Tries to steal Crypto
Currency Wallets
53->196
198
Multi AV Scanner detection
for dropped file
55->198
signatures13
process14
file15
202
Found strings related
to Crypto-Mining
59->202
77
conhost.exe
59->77
started
204
Query firmware table
information (likely
to detect VMs)
62->204
79
conhost.exe
62->79
started
81
conhost.exe
64->81
started
96
C:\Users\user\AppData\Local\...\3gecsuba.0.cs, Unicode
66->96
dropped
83
conhost.exe
66->83
started
85
chrome.exe
69->85
started
88
conhost.exe
71->88
started
90
conhost.exe
73->90
started
94
2 other processes
73->94
92
conhost.exe
75->92
started
signatures16
process17
dnsIp18
122
www.google.com
142.251.116.99
GOOGLEUS
United States
85->122
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.