Threat name:
Amadey, AsyncRAT, CryptOne, DarkTortilla
Alert
Classification:
troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Costura Assembly Loader
Yara detected CryptOne packer
Yara detected DarkTortilla Crypter
Yara detected LummaC Stealer
Yara detected RHADAMANTHYS Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1677039
Sample:
random.exe
Startdate:
29/04/2025
Architecture:
WINDOWS
Score:
100
114
itsrevolutionmagnus.xyz
2->114
116
httpss.ooguy.com
2->116
118
47 other IPs or domains
2->118
158
Suricata IDS alerts
for network traffic
2->158
160
Found malware configuration
2->160
162
Malicious sample detected
(through community Yara
rule)
2->162
166
25 other signatures
2->166
10
saved.exe
37
2->10
started
15
random.exe
1
2->15
started
17
msedge.exe
2->17
started
19
3 other processes
2->19
signatures3
164
Performs DNS queries
to domains with low
reputation
114->164
process4
dnsIp5
134
185.39.17.163, 49702, 49703, 49705
RU-TAGNET-ASRU
Russian Federation
10->134
136
94.26.90.80, 49710, 80
ASDETUKhttpwwwheficedcomGB
Bulgaria
10->136
98
C:\Users\user\AppData\Local\...\DoSA83G.exe, PE32+
10->98
dropped
100
C:\Users\user\AppData\Local\...\AJ2naPd.exe, PE32+
10->100
dropped
102
C:\Users\user\AppData\Local\...\47Q6wZM.exe, PE32+
10->102
dropped
106
13 other malicious files
10->106
dropped
224
Contains functionality
to start a terminal
service
10->224
21
VisualCode.exe
10->21
started
24
66fb330d73.exe
1
10->24
started
27
AJ2naPd.exe
10->27
started
33
7 other processes
10->33
138
185.39.17.162, 49700, 49704, 49706
RU-TAGNET-ASRU
Russian Federation
15->138
140
zenithcorde.top
172.67.190.162, 443, 49692, 49693
CLOUDFLARENETUS
United States
15->140
104
C:\Users\user\...\OZYTRD3G5PWMYWGKIJJLW.exe, PE32
15->104
dropped
226
Detected unpacking (changes
PE section rights)
15->226
228
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->228
230
Query firmware table
information (likely
to detect VMs)
15->230
232
7 other signatures
15->232
29
OZYTRD3G5PWMYWGKIJJLW.exe
4
15->29
started
31
msedge.exe
17->31
started
file6
signatures7
process8
dnsIp9
168
Multi AV Scanner detection
for dropped file
21->168
170
Writes to foreign memory
regions
21->170
172
Allocates memory in
foreign processes
21->172
36
MSBuild.exe
21->36
started
94
C:\Users\user\AppData\...\svchost015.exe, PE32
24->94
dropped
174
Detected unpacking (changes
PE section rights)
24->174
176
Tries to evade debugger
and weak emulator (self
modifying code)
24->176
190
6 other signatures
24->190
41
svchost015.exe
24->41
started
178
Injects a PE file into
a foreign processes
27->178
43
MSBuild.exe
27->43
started
96
C:\Users\user\AppData\Local\...\saved.exe, PE32
29->96
dropped
180
Contains functionality
to start a terminal
service
29->180
182
Contains functionality
to inject code into
remote processes
29->182
45
saved.exe
29->45
started
108
154.81.179.131
MULTA-ASN1US
Seychelles
33->108
110
time-a-g.nist.gov
129.6.15.28
US-NATIONAL-INSTITUTE-OF-STANDARDS-AND-TECHNOLOGYUS
United States
33->110
112
6 other IPs or domains
33->112
184
System process connects
to network (likely due
to code injection or
exploit)
33->184
186
Early bird code injection
technique detected
33->186
188
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
33->188
192
8 other signatures
33->192
47
MSBuild.exe
33->47
started
49
cmd.exe
33->49
started
51
MSBuild.exe
33->51
started
53
5 other processes
33->53
file10
signatures11
process12
dnsIp13
120
t.me
149.154.167.99, 443, 49716
TELEGRAMRU
United Kingdom
36->120
122
62.3a.4t.com
5.75.209.111
HETZNER-ASDE
Germany
36->122
84
C:\Users\user\AppData\...\B2_848382[1].exe, PE32
36->84
dropped
86
C:\Users\user\AppData\...\X_Browser[1].exe, PE32+
36->86
dropped
88
C:\Users\user\AppData\...\Q_Browser[1].exe, PE32
36->88
dropped
92
7 other malicious files
36->92
dropped
194
Attempt to bypass Chrome
Application-Bound Encryption
36->194
196
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
36->196
198
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
36->198
214
2 other signatures
36->214
55
msedge.exe
36->55
started
58
chrome.exe
36->58
started
61
msedge.exe
36->61
started
124
185.156.72.196
ITDELUXE-ASRU
Russian Federation
41->124
126
drive.usercontent.google.com
142.250.68.97
GOOGLEUS
United States
41->126
128
149.28.87.212
AS-CHOOPAUS
United States
43->128
200
Tries to steal Mail
credentials (via file
/ registry access)
43->200
216
4 other signatures
43->216
63
chrome.exe
43->63
started
71
2 other processes
43->71
202
Multi AV Scanner detection
for dropped file
45->202
204
Contains functionality
to start a terminal
service
45->204
130
185.215.113.51
WHOLESALECONNECTIONSNL
Portugal
47->130
132
vecturar.top
104.21.62.226
CLOUDFLARENETUS
United States
47->132
206
Query firmware table
information (likely
to detect VMs)
47->206
218
3 other signatures
47->218
208
Uses ping.exe to sleep
49->208
210
Uses ping.exe to check
the status of other
devices and networks
49->210
65
reg.exe
49->65
started
67
PING.EXE
49->67
started
69
conhost.exe
49->69
started
212
Tries to steal Crypto
Currency Wallets
51->212
90
C:\ProgramData\DNS.exe, PE32
53->90
dropped
73
4 other processes
53->73
file14
signatures15
process16
dnsIp17
220
Monitors registry run
keys for changes
55->220
75
msedge.exe
55->75
started
142
192.168.2.5, 443, 49675, 49691
unknown
unknown
58->142
77
chrome.exe
58->77
started
80
chrome.exe
58->80
started
82
chrome.exe
63->82
started
222
Creates an undocumented
autostart registry key
65->222
144
127.0.0.1
unknown
unknown
67->144
signatures18
process19
dnsIp20
146
ogads-pa.clients6.google.com
142.250.69.10
GOOGLEUS
United States
77->146
148
www.google.com
142.250.69.4
GOOGLEUS
United States
77->148
154
3 other IPs or domains
77->154
150
142.250.68.78
GOOGLEUS
United States
82->150
152
googlehosted.l.googleusercontent.com
192.178.49.193
GOOGLEUS
United States
82->152
156
5 other IPs or domains
82->156
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.