Threat name:
Amadey, CryptOne, LummaC Stealer, Njrat,
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables the Smart Screen filter
Disables Windows Defender Tamper protection
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected CryptOne packer
Yara detected LummaC Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1667504
Sample:
random.exe
Startdate:
17/04/2025
Architecture:
WINDOWS
Score:
100
124
brolyx95.duckdns.org
2->124
126
pastebin.com
2->126
128
48 other IPs or domains
2->128
152
Suricata IDS alerts
for network traffic
2->152
154
Found malware configuration
2->154
156
Malicious sample detected
(through community Yara
rule)
2->156
162
17 other signatures
2->162
10
namez.exe
7
43
2->10
started
15
random.exe
1
2->15
started
17
7d6867df33.exe
2->17
started
19
10 other processes
2->19
signatures3
158
Uses dynamic DNS services
124->158
160
Connects to a pastebin
service (likely for
C&C)
126->160
process4
dnsIp5
140
185.215.113.59, 49698, 49701, 49703
WHOLESALECONNECTIONSNL
Portugal
10->140
114
C:\Users\user\AppData\...\2382b1c3ee.exe, PE32
10->114
dropped
116
C:\Users\user\AppData\...\03d67ebd1b.exe, PE32
10->116
dropped
118
C:\Users\user\AppData\...\7d6867df33.exe, PE32
10->118
dropped
122
13 other malicious files
10->122
dropped
192
Contains functionality
to start a terminal
service
10->192
194
Creates multiple autostart
registry keys
10->194
21
c09c96227a.exe
10->21
started
25
be2426f0e9.exe
10->25
started
27
7d6867df33.exe
10->27
started
35
6 other processes
10->35
142
185.39.17.162, 49690, 49702, 49704
RU-TAGNET-ASRU
Russian Federation
15->142
144
clarmodq.top
104.21.85.126, 443, 49682, 49683
CLOUDFLARENETUS
United States
15->144
120
C:\Users\user\...\SB19S3F75PB5E6EXOW7Y33.exe, PE32
15->120
dropped
196
Detected unpacking (changes
PE section rights)
15->196
198
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->198
200
Query firmware table
information (likely
to detect VMs)
15->200
212
3 other signatures
15->212
29
SB19S3F75PB5E6EXOW7Y33.exe
4
15->29
started
202
Tries to steal Crypto
Currency Wallets
17->202
204
Hides threads from debuggers
17->204
206
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->206
31
chrome.exe
17->31
started
146
127.0.0.1
unknown
unknown
19->146
208
Multi AV Scanner detection
for dropped file
19->208
210
Changes security center
settings (notifications,
updates, antivirus,
firewall)
19->210
33
MpCmdRun.exe
19->33
started
file6
signatures7
process8
dnsIp9
76
C:\Users\user\AppData\...\c09c96227a.tmp, PE32
21->76
dropped
164
Multi AV Scanner detection
for dropped file
21->164
38
c09c96227a.tmp
21->38
started
78
C:\Users\user\AppData\...\svchost015.exe, PE32
25->78
dropped
166
Detected unpacking (changes
PE section rights)
25->166
184
9 other signatures
25->184
41
svchost015.exe
25->41
started
80
C:\Users\...\P1RJWDMNASKUNK1J3YH04XWEQ1.exe, PE32
27->80
dropped
168
Attempt to bypass Chrome
Application-Bound Encryption
27->168
170
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
27->170
172
Query firmware table
information (likely
to detect VMs)
27->172
186
3 other signatures
27->186
82
C:\Users\user\AppData\Local\...\namez.exe, PE32
29->82
dropped
174
Contains functionality
to start a terminal
service
29->174
176
Contains functionality
to inject code into
remote processes
29->176
44
namez.exe
29->44
started
178
Installs a global keyboard
hook
31->178
47
conhost.exe
33->47
started
130
brolyx95.duckdns.org
176.160.157.96
BOUYGTEL-ISPFR
France
35->130
132
ipwho.is
15.204.213.5
HP-INTERNET-ASUS
United States
35->132
84
C:\Users\user\AppData\...\67Zhc7pQhUgA.exe, PE32
35->84
dropped
180
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
35->180
182
Modifies windows update
settings
35->182
188
5 other signatures
35->188
49
MSBuild.exe
35->49
started
51
svchost015.exe
35->51
started
53
schtasks.exe
35->53
started
55
taskkill.exe
35->55
started
file10
signatures11
process12
dnsIp13
86
C:\Users\user\AppData\...\unins000.exe (copy), PE32
38->86
dropped
88
C:\Users\user\AppData\...\is-LS3L9.tmp, PE32
38->88
dropped
90
C:\Users\user\AppData\...\is-KQ1OT.tmp, PE32+
38->90
dropped
98
6 other malicious files
38->98
dropped
57
KMSpico.exe
38->57
started
60
core.exe
38->60
started
64
info.exe
38->64
started
134
185.156.73.98, 49716, 80
RELDAS-NETRU
Russian Federation
41->134
92
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
41->92
dropped
100
3 other malicious files
41->100
dropped
214
Contains functionality
to start a terminal
service
44->214
136
t.me
149.154.167.99, 443, 49705
TELEGRAMRU
United Kingdom
49->136
138
overlapseq.digital
104.21.32.1, 443, 49706, 49707
CLOUDFLARENETUS
United States
49->138
216
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
49->216
218
Query firmware table
information (likely
to detect VMs)
49->218
220
Tries to harvest and
steal ftp login credentials
49->220
222
Tries to steal Crypto
Currency Wallets
49->222
94
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
51->94
dropped
96
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
51->96
dropped
102
2 other malicious files
51->102
dropped
66
conhost.exe
53->66
started
68
conhost.exe
55->68
started
file14
signatures15
process16
dnsIp17
112
C:\Users\user\AppData\Local\...\KMSpico.tmp, PE32
57->112
dropped
70
KMSpico.tmp
57->70
started
148
changeaie.top
104.21.42.7
CLOUDFLARENETUS
United States
60->148
224
Tries to steal Crypto
Currency Wallets
60->224
150
stats-1.crabdance.com
82.115.223.212
MIDNET-ASTK-TelecomRU
Russian Federation
64->150
74
conhost.exe
64->74
started
file18
signatures19
process20
file21
104
C:\Windows\...\Vestris.ResourceLib.dll (copy), PE32
70->104
dropped
106
C:\Windows\System32\is-4IMNJ.tmp, PE32
70->106
dropped
108
C:\Windows\System32\is-0VM6V.tmp, PE32
70->108
dropped
110
18 other malicious files
70->110
dropped
190
Disables the Smart Screen
filter
70->190
signatures22
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.