Threat name:
Amadey, LummaC Stealer
Alert
Classification:
troj.spyw.evad
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found API chain indicative of debugger detection
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Sigma detected: Suspicious Invoke-WebRequest Execution
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1673825
Sample:
RWjLVJ9FrG.exe
Startdate:
25/04/2025
Architecture:
WINDOWS
Score:
100
86
www.google.com
2->86
88
raw.githubusercontent.com
2->88
90
11 other IPs or domains
2->90
106
Suricata IDS alerts
for network traffic
2->106
108
Found malware configuration
2->108
110
Antivirus detection
for URL or domain
2->110
112
24 other signatures
2->112
9
saved.exe
4
46
2->9
started
14
RWjLVJ9FrG.exe
1
2->14
started
16
svchost.exe
2->16
started
18
4 other processes
2->18
signatures3
process4
dnsIp5
92
185.39.17.163, 49729, 49730, 49733
RU-TAGNET-ASRU
Russian Federation
9->92
74
C:\Users\user\AppData\...\281c12b425.exe, PE32
9->74
dropped
76
C:\Users\user\AppData\...\ddc34001ff.exe, PE32
9->76
dropped
78
C:\Users\user\AppData\...\2db418e9e5.exe, PE32
9->78
dropped
82
15 other malicious files
9->82
dropped
134
Contains functionality
to start a terminal
service
9->134
136
Creates multiple autostart
registry keys
9->136
20
ajNyRQT.exe
1
2
9->20
started
24
VbLeLbQ.exe
9->24
started
94
185.39.17.162, 49728, 49732, 49734
RU-TAGNET-ASRU
Russian Federation
14->94
96
clarmodq.top
172.67.205.184, 443, 49716, 49718
CLOUDFLARENETUS
United States
14->96
80
C:\...\YIYUMYBQJ7SXGR4XUXX7BI8KL2YUH.exe, PE32
14->80
dropped
138
Detected unpacking (changes
PE section rights)
14->138
140
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
14->140
142
Query firmware table
information (likely
to detect VMs)
14->142
148
10 other signatures
14->148
26
YIYUMYBQJ7SXGR4XUXX7BI8KL2YUH.exe
4
14->26
started
144
Changes security center
settings (notifications,
updates, antivirus,
firewall)
16->144
28
MpCmdRun.exe
16->28
started
98
127.0.0.1
unknown
unknown
18->98
146
Multi AV Scanner detection
for dropped file
18->146
file6
signatures7
process8
file9
70
C:\ProgramData\...\lhhsgwktkatl.exe, PE32+
20->70
dropped
114
Multi AV Scanner detection
for dropped file
20->114
116
Uses powercfg.exe to
modify the power settings
20->116
118
Modifies the context
of a thread in another
process (thread injection)
20->118
120
Modifies power options
to not sleep / hibernate
20->120
30
dialer.exe
20->30
started
33
powershell.exe
23
20->33
started
35
cmd.exe
20->35
started
47
13 other processes
20->47
122
Suspicious powershell
command line found
24->122
124
Found API chain indicative
of debugger detection
24->124
126
Adds a directory exclusion
to Windows Defender
24->126
128
Found direct / indirect
Syscall (likely to bypass
EDR)
24->128
37
cmd.exe
24->37
started
39
powershell.exe
24->39
started
41
conhost.exe
24->41
started
72
C:\Users\user\AppData\Local\...\saved.exe, PE32
26->72
dropped
130
Contains functionality
to start a terminal
service
26->130
132
Contains functionality
to inject code into
remote processes
26->132
43
saved.exe
26->43
started
45
conhost.exe
28->45
started
signatures10
process11
signatures12
150
Injects code into the
Windows Explorer (explorer.exe)
30->150
152
Writes to foreign memory
regions
30->152
154
Allocates memory in
foreign processes
30->154
166
3 other signatures
30->166
49
lsass.exe
30->49
injected
66
9 other processes
30->66
156
Loading BitLocker PowerShell
Module
33->156
158
Powershell drops PE
file
33->158
52
conhost.exe
33->52
started
54
conhost.exe
35->54
started
56
wusa.exe
35->56
started
160
Suspicious powershell
command line found
37->160
58
powershell.exe
37->58
started
62
conhost.exe
39->62
started
162
Multi AV Scanner detection
for dropped file
43->162
164
Contains functionality
to start a terminal
service
43->164
64
conhost.exe
47->64
started
68
12 other processes
47->68
process13
dnsIp14
104
Writes to foreign memory
regions
49->104
100
github.com
140.82.112.3, 443, 49737
GITHUBUS
United States
58->100
102
raw.githubusercontent.com
185.199.111.133, 443, 49741
FASTLYUS
Netherlands
58->102
84
C:\Users\user\AppData\...\izftboodeosh.exe, PE32
58->84
dropped
file15
signatures16
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.