Threat name:
Amadey, CryptOne, LummaC Stealer, Privat
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains potential unpacker
AI detected malicious Powershell script
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables the Smart Screen filter
Disables Windows Defender Tamper protection
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Schedule system process
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected CryptOne packer
Yara detected LummaC Stealer
Yara detected PrivateLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1667479
Sample:
random.exe
Startdate:
17/04/2025
Architecture:
WINDOWS
Score:
100
169
Found malware configuration
2->169
171
Antivirus detection
for URL or domain
2->171
173
Antivirus / Scanner
detection for submitted
sample
2->173
175
21 other signatures
2->175
9
namez.exe
7
81
2->9
started
14
random.exe
1
2->14
started
16
faa8f4e30b.exe
2->16
started
18
10 other processes
2->18
process3
dnsIp4
137
185.215.113.59
WHOLESALECONNECTIONSNL
Portugal
9->137
139
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
9->139
107
C:\Users\user\AppData\Local\...\70DYYFX.exe, PE32+
9->107
dropped
109
C:\Users\user\AppData\Local\...\amnew.exe, PE32
9->109
dropped
123
39 other malicious files
9->123
dropped
203
Contains functionality
to start a terminal
service
9->203
205
Creates multiple autostart
registry keys
9->205
20
02d6296c75.exe
9->20
started
24
32fa812eca.exe
9->24
started
26
7355a14186.exe
9->26
started
36
6 other processes
9->36
141
185.39.17.162
RU-TAGNET-ASRU
Russian Federation
14->141
143
172.67.205.184
CLOUDFLARENETUS
United States
14->143
111
C:\Users\...\CUS8RJ5G0T9U7PVC6WRG8F7DX1GJ.exe, PE32
14->111
dropped
207
Detected unpacking (changes
PE section rights)
14->207
209
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
14->209
211
Query firmware table
information (likely
to detect VMs)
14->211
225
2 other signatures
14->225
28
CUS8RJ5G0T9U7PVC6WRG8F7DX1GJ.exe
4
14->28
started
145
127.0.0.1
unknown
unknown
16->145
113
C:\Users\user\...\MLDLQ52OMX3V6JYIQRS4.exe, PE32
16->113
dropped
213
Tries to harvest and
steal browser information
(history, passwords,
etc)
16->213
215
Tries to steal Crypto
Currency Wallets
16->215
217
Hides threads from debuggers
16->217
30
chrome.exe
16->30
started
115
C:\Users\user\AppData\Local\...\nircmd.exe, PE32+
18->115
dropped
117
C:\Users\user\AppData\Local\...\cecho.exe, PE32
18->117
dropped
119
C:\Users\user\AppData\Local\...119SudoLG.exe, PE32+
18->119
dropped
121
C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32
18->121
dropped
219
Changes security center
settings (notifications,
updates, antivirus,
firewall)
18->219
221
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
18->221
223
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
18->223
32
MpCmdRun.exe
18->32
started
34
conhost.exe
18->34
started
file5
signatures6
process7
dnsIp8
79
C:\Users\user\AppData\...\02d6296c75.tmp, PE32
20->79
dropped
177
Multi AV Scanner detection
for dropped file
20->177
39
02d6296c75.tmp
20->39
started
81
C:\Users\user\AppData\...\svchost015.exe, PE32
24->81
dropped
179
Detected unpacking (changes
PE section rights)
24->179
181
Writes to foreign memory
regions
24->181
183
Allocates memory in
foreign processes
24->183
197
4 other signatures
24->197
42
svchost015.exe
24->42
started
185
Tries to evade debugger
and weak emulator (self
modifying code)
26->185
199
2 other signatures
26->199
45
svchost015.exe
26->45
started
83
C:\Users\user\AppData\Local\...\namez.exe, PE32
28->83
dropped
187
Contains functionality
to start a terminal
service
28->187
189
Contains functionality
to inject code into
remote processes
28->189
47
namez.exe
28->47
started
50
chrome.exe
30->50
started
52
conhost.exe
32->52
started
135
45.82.254.120
DEDIPATH-LLCUS
Russian Federation
36->135
85
C:\...\K3TT86WTA2U7R7BIQAWYEQZSYJ6JAD.exe, PE32
36->85
dropped
87
C:\Users\user\AppData\Local\Temp\Win.ps1, ASCII
36->87
dropped
191
Attempt to bypass Chrome
Application-Bound Encryption
36->191
193
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
36->193
195
Query firmware table
information (likely
to detect VMs)
36->195
201
8 other signatures
36->201
54
MSBuild.exe
36->54
started
56
MSBuild.exe
36->56
started
58
5 other processes
36->58
file9
signatures10
process11
dnsIp12
89
C:\Users\user\AppData\...\unins000.exe (copy), PE32
39->89
dropped
91
C:\Users\user\AppData\...\is-T3Q4N.tmp, PE32
39->91
dropped
93
C:\Users\user\AppData\...\is-S1HU7.tmp, PE32
39->93
dropped
101
6 other malicious files
39->101
dropped
60
KMSpico.exe
39->60
started
63
core.exe
39->63
started
147
185.156.73.98
RELDAS-NETRU
Russian Federation
42->147
95
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
42->95
dropped
97
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
42->97
dropped
103
2 other malicious files
42->103
dropped
99
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
45->99
dropped
105
3 other malicious files
45->105
dropped
229
Contains functionality
to start a terminal
service
47->229
149
108.177.122.138
GOOGLEUS
United States
50->149
151
142.250.9.104
GOOGLEUS
United States
50->151
157
4 other IPs or domains
50->157
153
149.154.167.99
TELEGRAMRU
United Kingdom
54->153
155
104.21.64.1
CLOUDFLARENETUS
United States
54->155
231
Query firmware table
information (likely
to detect VMs)
54->231
233
Tries to harvest and
steal ftp login credentials
54->233
235
Tries to steal Crypto
Currency Wallets
54->235
237
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
56->237
67
conhost.exe
58->67
started
69
conhost.exe
58->69
started
71
conhost.exe
58->71
started
73
conhost.exe
58->73
started
file13
signatures14
process15
dnsIp16
133
C:\Users\user\AppData\Local\...\KMSpico.tmp, PE32
60->133
dropped
75
KMSpico.tmp
60->75
started
159
104.21.42.7
CLOUDFLARENETUS
United States
63->159
161
104.22.68.199
CLOUDFLARENETUS
United States
63->161
163
Query firmware table
information (likely
to detect VMs)
63->163
165
Tries to harvest and
steal browser information
(history, passwords,
etc)
63->165
167
Tries to steal Crypto
Currency Wallets
63->167
file17
signatures18
process19
file20
125
C:\Windows\...\Vestris.ResourceLib.dll (copy), PE32
75->125
dropped
127
C:\Windows\System32\is-9JA74.tmp, PE32
75->127
dropped
129
C:\Windows\System32\is-2KGG6.tmp, PE32
75->129
dropped
131
18 other malicious files
75->131
dropped
227
Disables the Smart Screen
filter
75->227
signatures21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.