Threat name:
Amadey, LummaC Stealer
Alert
Classification:
phis.troj.spyw.evad
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses schtasks.exe or at.exe to add and modify task schedules
Uses threadpools to delay analysis
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1700030
Sample:
random.exe
Startdate:
27/05/2025
Architecture:
WINDOWS
Score:
100
140
korxddl.top
2->140
142
harumseeiw.top
2->142
144
14 other IPs or domains
2->144
168
Suricata IDS alerts
for network traffic
2->168
170
Found malware configuration
2->170
172
Antivirus detection
for dropped file
2->172
174
29 other signatures
2->174
11
random.exe
5
2->11
started
15
saren.exe
2->15
started
18
ramez.exe
2->18
started
20
9 other processes
2->20
signatures3
process4
dnsIp5
124
C:\Users\user\AppData\Local\...\ramez.exe, PE32
11->124
dropped
126
C:\Users\user\...\ramez.exe:Zone.Identifier, ASCII
11->126
dropped
238
Detected unpacking (changes
PE section rights)
11->238
240
Contains functionality
to start a terminal
service
11->240
242
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
11->242
258
3 other signatures
11->258
22
ramez.exe
56
11->22
started
162
github.com
140.82.114.4, 443, 49711, 49718
GITHUBUS
United States
15->162
164
objects.githubusercontent.com
185.199.110.133, 443, 49714, 49719
FASTLYUS
Netherlands
15->164
128
C:\Users\user\AppData\...\4efa7b1063.exe, PE32
15->128
dropped
130
C:\Users\user\AppData\...\LummaC2441212.exe, PE32
15->130
dropped
132
C:\Users\user\AppData\Local\...\fuck12312.exe, PE32+
15->132
dropped
134
6 other malicious files
15->134
dropped
27
fuck12312.exe
15->27
started
29
cron1.exe
15->29
started
31
cron2.exe
15->31
started
244
Hides threads from debuggers
18->244
246
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
18->246
248
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
18->248
166
127.0.0.1
unknown
unknown
20->166
250
Suspicious powershell
command line found
20->250
252
Changes security center
settings (notifications,
updates, antivirus,
firewall)
20->252
254
Tries to download and
execute files (via powershell)
20->254
256
Uses threadpools to
delay analysis
20->256
33
powershell.exe
20->33
started
file6
signatures7
process8
dnsIp9
152
185.156.72.2, 49691, 49698, 49708
ITDELUXE-ASRU
Russian Federation
22->152
154
185.156.72.96, 49683, 49684, 49695
ITDELUXE-ASRU
Russian Federation
22->154
156
2 other IPs or domains
22->156
116
C:\Users\user\AppData\Local\...\1FcafRm.exe, PE32+
22->116
dropped
118
C:\Users\user\AppData\Local\...\amnew.exe, PE32
22->118
dropped
120
C:\Users\user\AppData\Local\...\sGe7ljJ.exe, PE32+
22->120
dropped
122
24 other malicious files
22->122
dropped
202
Multi AV Scanner detection
for dropped file
22->202
204
Detected unpacking (changes
PE section rights)
22->204
206
Contains functionality
to start a terminal
service
22->206
216
6 other signatures
22->216
35
4e9b7527c9.exe
22->35
started
39
Nw2x8ps.exe
22->39
started
41
sGe7ljJ.exe
1
22->41
started
50
3 other processes
22->50
208
Writes to foreign memory
regions
27->208
210
Allocates memory in
foreign processes
27->210
212
Injects a PE file into
a foreign processes
27->212
214
Found direct / indirect
Syscall (likely to bypass
EDR)
27->214
43
MSBuild.exe
27->43
started
46
conhost.exe
27->46
started
52
2 other processes
29->52
54
2 other processes
31->54
48
conhost.exe
33->48
started
file10
signatures11
process12
dnsIp13
112
C:\Users\user\AppData\Local\...\b9Lz1ntY0.hta, HTML
35->112
dropped
176
Binary is likely a compiled
AutoIt script file
35->176
178
Creates HTA files
35->178
56
mshta.exe
35->56
started
59
cmd.exe
35->59
started
180
Multi AV Scanner detection
for dropped file
39->180
198
2 other signatures
39->198
61
Nw2x8ps.exe
39->61
started
64
conhost.exe
39->64
started
182
Antivirus detection
for dropped file
41->182
200
2 other signatures
41->200
66
MSBuild.exe
41->66
started
69
conhost.exe
41->69
started
158
korxddl.top
104.21.42.191
CLOUDFLARENETUS
United States
43->158
184
Query firmware table
information (likely
to detect VMs)
43->184
186
Tries to harvest and
steal ftp login credentials
43->186
188
Tries to harvest and
steal browser information
(history, passwords,
etc)
43->188
190
Tries to steal from
password manager
43->190
114
C:\Users\user\AppData\Local\...\saren.exe, PE32
50->114
dropped
192
Contains functionality
to start a terminal
service
50->192
194
Injects a PE file into
a foreign processes
50->194
71
MSBuild.exe
50->71
started
73
saren.exe
50->73
started
75
2 other processes
50->75
160
harumseeiw.top
104.21.16.1, 443, 49721, 49731
CLOUDFLARENETUS
United States
52->160
196
Tries to steal Crypto
Currency Wallets
54->196
file14
signatures15
process16
dnsIp17
218
Suspicious powershell
command line found
56->218
220
Tries to download and
execute files (via powershell)
56->220
77
powershell.exe
56->77
started
222
Uses schtasks.exe or
at.exe to add and modify
task schedules
59->222
81
conhost.exe
59->81
started
83
schtasks.exe
59->83
started
136
C:\ProgramData\...\vtvfrgstjumu.exe, PE32+
61->136
dropped
224
Modifies the context
of a thread in another
process (thread injection)
61->224
226
Adds a directory exclusion
to Windows Defender
61->226
85
powershell.exe
61->85
started
87
cmd.exe
61->87
started
89
sc.exe
61->89
started
91
3 other processes
61->91
146
t.me
149.154.167.99, 443, 49699
TELEGRAMRU
United Kingdom
66->146
148
cvzco.run
104.21.90.227, 443, 49700, 49703
CLOUDFLARENETUS
United States
66->148
228
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
66->228
230
Query firmware table
information (likely
to detect VMs)
66->230
232
Tries to steal Crypto
Currency Wallets
66->232
150
greengwjz.top
104.21.32.1, 443, 49717, 49720
CLOUDFLARENETUS
United States
71->150
234
Multi AV Scanner detection
for dropped file
73->234
236
Contains functionality
to start a terminal
service
73->236
file18
signatures19
process20
file21
138
TempSD3YIYSOVAO3HPLVM4KVQBWJX3FBESAZ.EXE, PE32
77->138
dropped
264
Powershell drops PE
file
77->264
93
TempSD3YIYSOVAO3HPLVM4KVQBWJX3FBESAZ.EXE
77->93
started
96
conhost.exe
77->96
started
266
Loading BitLocker PowerShell
Module
85->266
98
conhost.exe
85->98
started
100
conhost.exe
87->100
started
102
wusa.exe
87->102
started
104
conhost.exe
89->104
started
106
conhost.exe
91->106
started
108
conhost.exe
91->108
started
110
conhost.exe
91->110
started
signatures22
process23
signatures24
260
Multi AV Scanner detection
for dropped file
93->260
262
Contains functionality
to start a terminal
service
93->262
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.