Threat name:
Amadey, LummaC Stealer, Xmrig
Alert
Classification:
rans.phis.troj.spyw.expl.evad.mine
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys Clipper DLL
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1699538
Sample:
random.exe
Startdate:
27/05/2025
Architecture:
WINDOWS
Score:
100
157
server25.mentality.cloud
2->157
159
WRDnltbcJYcpYNfIZnCJsx.WRDnltbcJYcpYNfIZnCJsx
2->159
161
7 other IPs or domains
2->161
207
Suricata IDS alerts
for network traffic
2->207
209
Found malware configuration
2->209
211
Malicious sample detected
(through community Yara
rule)
2->211
213
36 other signatures
2->213
11
random.exe
5
2->11
started
15
WinService.exe
2->15
started
17
ramez.exe
2->17
started
19
9 other processes
2->19
signatures3
process4
dnsIp5
139
C:\Users\user\AppData\Local\...\ramez.exe, PE32
11->139
dropped
141
C:\Users\user\...\ramez.exe:Zone.Identifier, ASCII
11->141
dropped
279
Detected unpacking (changes
PE section rights)
11->279
281
Contains functionality
to start a terminal
service
11->281
283
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
11->283
299
2 other signatures
11->299
22
ramez.exe
2
66
11->22
started
285
Multi AV Scanner detection
for dropped file
15->285
287
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
15->287
289
Suspicious powershell
command line found
15->289
301
2 other signatures
15->301
27
powershell.exe
15->27
started
29
reg.exe
15->29
started
303
3 other signatures
17->303
163
127.0.0.1
unknown
unknown
19->163
291
Changes security center
settings (notifications,
updates, antivirus,
firewall)
19->291
293
Tries to download and
execute files (via powershell)
19->293
295
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
19->295
297
Found direct / indirect
Syscall (likely to bypass
EDR)
19->297
31
cmd.exe
19->31
started
33
powershell.exe
19->33
started
35
cmd.exe
19->35
started
file6
signatures7
process8
dnsIp9
171
185.156.72.2, 49723, 49726, 49756
ITDELUXE-ASRU
Russian Federation
22->171
173
185.156.72.96, 49718, 49721, 49724
ITDELUXE-ASRU
Russian Federation
22->173
175
2 other IPs or domains
22->175
129
C:\Users\user\AppData\...\a10030c49e.exe, PE32
22->129
dropped
131
C:\Users\user\AppData\...\28ec4790d8.exe, PE32
22->131
dropped
133
C:\Users\user\AppData\...\55f168c398.exe, PE32
22->133
dropped
135
29 other malicious files
22->135
dropped
243
Multi AV Scanner detection
for dropped file
22->243
245
Detected unpacking (changes
PE section rights)
22->245
247
Contains functionality
to start a terminal
service
22->247
251
13 other signatures
22->251
37
DeadTournament.exe
22->37
started
41
fxLhECP.exe
3
22->41
started
44
oxDU0MW.exe
22->44
started
54
3 other processes
22->54
249
Loading BitLocker PowerShell
Module
27->249
46
conhost.exe
27->46
started
48
conhost.exe
29->48
started
56
2 other processes
31->56
50
conhost.exe
33->50
started
52
conhost.exe
35->52
started
file10
signatures11
process12
dnsIp13
111
C:\Users\user\AppData\...\Wonderful.mpeg, data
37->111
dropped
125
9 other malicious files
37->125
dropped
217
Multi AV Scanner detection
for dropped file
37->217
219
Writes many files with
high entropy
37->219
58
cmd.exe
37->58
started
177
188.37.160.41, 49725, 7706
VODAFONE-PTVodafonePortugalPT
Portugal
41->177
221
Antivirus detection
for dropped file
41->221
223
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
41->223
225
Tries to steal Mail
credentials (via file
/ registry access)
41->225
237
6 other signatures
41->237
62
chrome.exe
41->62
started
65
chrome.exe
41->65
injected
75
2 other processes
41->75
179
xai830k.com
152.89.61.96
YURTEH-ASUA
Ukraine
44->179
181
api64.ipify.org
104.237.62.213
WEBNXUS
United States
44->181
183
45.144.212.77
HPC-MVM-ASHU
Ukraine
44->183
113
C:\Windows\Win-v41.exe, PE32+
44->113
dropped
115
C:\Windows\System32\Win-v42.exe, PE32+
44->115
dropped
117
C:\Users\user\AppData\Local\Temp\TH9BDE.tmp, PE32
44->117
dropped
127
2 other malicious files
44->127
dropped
227
Creates multiple autostart
registry keys
44->227
229
Modifies the context
of a thread in another
process (thread injection)
44->229
239
2 other signatures
44->239
67
powershell.exe
44->67
started
185
server25.mentality.cloud
51.38.196.118, 49766, 49778, 49780
OVHFR
France
54->185
187
172.86.105.63, 49754, 49771, 8080
PONYNETUS
United States
54->187
189
api.ipify.org
104.26.12.205, 49759, 49762, 49774
CLOUDFLARENETUS
United States
54->189
119
C:\Users\user\AppData\...\WinService.exe, PE32
54->119
dropped
121
C:\ProgramData\PrivacyGroup\securevpn.exe, PE32+
54->121
dropped
123
C:\Users\user\AppData\Local\...\cWZvWTUPc.hta, HTML
54->123
dropped
231
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
54->231
233
Suspicious powershell
command line found
54->233
235
Uses cmd line tools
excessively to alter
registry or file data
54->235
241
2 other signatures
54->241
69
mshta.exe
54->69
started
71
powershell.exe
54->71
started
73
reg.exe
54->73
started
77
5 other processes
54->77
file14
signatures15
process16
dnsIp17
137
C:\Users\user\AppData\Local\...\Reviewer.com, PE32
58->137
dropped
253
Uses cmd line tools
excessively to alter
registry or file data
58->253
255
Drops PE files with
a suspicious file extension
58->255
257
Uses schtasks.exe or
at.exe to add and modify
task schedules
58->257
259
Writes many files with
high entropy
58->259
79
Reviewer.com
58->79
started
94
10 other processes
58->94
191
192.168.2.4, 443, 49708, 49711
unknown
unknown
62->191
261
Suspicious powershell
command line found
62->261
263
Found many strings related
to Crypto-Wallets (likely
being stolen)
62->263
265
Suspicious execution
chain found
62->265
267
Adds a directory exclusion
to Windows Defender
62->267
83
chrome.exe
62->83
started
86
conhost.exe
67->86
started
269
Tries to download and
execute files (via powershell)
69->269
88
powershell.exe
69->88
started
271
Loading BitLocker PowerShell
Module
71->271
273
Powershell drops PE
file
71->273
90
conhost.exe
71->90
started
275
Adds extensions / path
to Windows Defender
exclusion list (Registry)
73->275
96
3 other processes
73->96
193
88.119.165.37, 49772, 8081
IST-ASLT
Lithuania
77->193
277
Found direct / indirect
Syscall (likely to bypass
EDR)
77->277
92
WMIC.exe
77->92
started
98
7 other processes
77->98
file18
signatures19
process20
dnsIp21
143
C:\Users\user\AppData\Local\...\SwiftFish.com, PE32
79->143
dropped
145
C:\Users\user\AppData\Local\...\RegAsm.exe, PE32
79->145
dropped
147
C:\Users\user\AppData\Local\...\q, data
79->147
dropped
149
C:\Users\user\AppData\Local\...\SwiftFish.js, ASCII
79->149
dropped
195
Drops PE files with
a suspicious file extension
79->195
197
Writes to foreign memory
regions
79->197
199
Writes many files with
high entropy
79->199
201
Injects a PE file into
a foreign processes
79->201
165
clients2.googleusercontent.com
83->165
167
googlehosted.l.googleusercontent.com
142.250.101.132, 443, 49747
GOOGLEUS
United States
83->167
169
www.google.com
74.125.137.103, 443, 49731, 49732
GOOGLEUS
United States
83->169
203
Found many strings related
to Crypto-Wallets (likely
being stolen)
83->203
151
TempWAF2ABHB5PTNZX0A5IGZFXXHCEI2IZ2F.EXE, PE32
88->151
dropped
100
TempWAF2ABHB5PTNZX0A5IGZFXXHCEI2IZ2F.EXE
88->100
started
103
conhost.exe
88->103
started
205
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
92->205
153
C:\Users\user\AppData\Local\Temp\581856\z, data
94->153
dropped
155
C:\Users\user\AppData\...\SwiftFish.url, MS
96->155
dropped
105
conhost.exe
96->105
started
107
schtasks.exe
96->107
started
109
conhost.exe
96->109
started
file22
signatures23
process24
signatures25
215
Multi AV Scanner detection
for dropped file
100->215
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.