Threat name:
Amadey, DarkVision Rat, LummaC Stealer
Alert
Classification:
troj.spyw.expl.evad
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates autostart registry keys with suspicious names
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Windows Binaries Write Suspicious Extensions
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected DarkVision Rat
Yara detected LummaC Stealer
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1662107
Sample:
pGhCMX9vwu.exe
Startdate:
10/04/2025
Architecture:
WINDOWS
Score:
100
132
Found malware configuration
2->132
134
Malicious sample detected
(through community Yara
rule)
2->134
136
Antivirus detection
for URL or domain
2->136
138
17 other signatures
2->138
8
rapes.exe
42
2->8
started
13
futors.exe
40
2->13
started
15
pGhCMX9vwu.exe
5
2->15
started
17
rapes.exe
2->17
started
process3
dnsIp4
102
176.113.115.6
SELECTELRU
Russian Federation
8->102
104
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
8->104
106
176.113.115.7
SELECTELRU
Russian Federation
8->106
74
C:\Users\user\AppData\Local\...\fd67EIq.exe, PE32
8->74
dropped
76
C:\Users\user\AppData\Local\...\UZPt0hR.exe, PE32
8->76
dropped
78
C:\Users\user\AppData\Local\...\D3fQA0J.exe, PE32
8->78
dropped
88
16 other malicious files
8->88
dropped
166
Contains functionality
to start a terminal
service
8->166
168
Hides threads from debuggers
8->168
170
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
8->170
19
UZPt0hR.exe
8->19
started
22
B4Wpwz6.exe
8->22
started
24
amnew.exe
4
8->24
started
35
3 other processes
8->35
108
185.215.113.209
WHOLESALECONNECTIONSNL
Portugal
13->108
110
140.82.112.4
GITHUBUS
United States
13->110
112
185.199.110.133
FASTLYUS
Netherlands
13->112
80
C:\Users\user\AppData\...\11ae8d885f.exe, PE32
13->80
dropped
82
C:\Users\user\AppData\...\yellowvolciv.exe, PE32+
13->82
dropped
90
16 other malicious files
13->90
dropped
172
Tries to detect sandboxes
/ dynamic malware analysis
system (file name check)
13->172
27
cr2.exe
13->27
started
29
cr1.exe
13->29
started
31
joker1221.exe
13->31
started
38
2 other processes
13->38
84
C:\Users\user\AppData\Local\...\rapes.exe, PE32
15->84
dropped
86
C:\Users\user\...\rapes.exe:Zone.Identifier, ASCII
15->86
dropped
174
Detected unpacking (changes
PE section rights)
15->174
176
Tries to evade debugger
and weak emulator (self
modifying code)
15->176
178
Tries to detect virtualization
through RDTSC time measurements
15->178
33
rapes.exe
15->33
started
180
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->180
file5
signatures6
process7
dnsIp8
140
Multi AV Scanner detection
for dropped file
19->140
142
Query firmware table
information (likely
to detect VMs)
19->142
158
4 other signatures
19->158
40
svchost.exe
19->40
started
45
cmd.exe
19->45
started
47
MSBuild.exe
22->47
started
72
C:\Users\user\AppData\Local\...\futors.exe, PE32
24->72
dropped
144
Antivirus detection
for dropped file
24->144
146
Contains functionality
to inject code into
remote processes
24->146
49
futors.exe
24->49
started
160
3 other signatures
27->160
51
2 other processes
27->51
53
2 other processes
29->53
55
2 other processes
31->55
148
Detected unpacking (changes
PE section rights)
33->148
150
Contains functionality
to start a terminal
service
33->150
152
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
33->152
162
5 other signatures
33->162
100
104.21.67.39
CLOUDFLARENETUS
United States
35->100
154
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
35->154
164
2 other signatures
35->164
57
2 other processes
35->57
156
Detected unpacking (creates
a PE file in dynamic
memory)
38->156
59
2 other processes
38->59
file9
signatures10
process11
dnsIp12
114
82.29.67.160
NTLGB
United Kingdom
40->114
126
2 other IPs or domains
40->126
92
C:\Users\user\AppData\Local\...\w32tm.exe, PE32+
40->92
dropped
94
C:\ProgramData\...\tzutil.exe, PE32+
40->94
dropped
96
C:\Users\user\AppData\Local\Temp\...\set.bat, PNG
40->96
dropped
182
Benign windows process
drops PE files
40->182
184
Creates autostart registry
keys with suspicious
names
40->184
61
tzutil.exe
40->61
started
66
cmd.exe
40->66
started
186
Adds a directory exclusion
to Windows Defender
45->186
68
powershell.exe
45->68
started
70
conhost.exe
45->70
started
116
149.154.167.99
TELEGRAMRU
United Kingdom
47->116
118
104.21.32.1
CLOUDFLARENETUS
United States
47->118
188
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
47->188
190
Query firmware table
information (likely
to detect VMs)
47->190
192
Tries to steal Crypto
Currency Wallets
47->192
194
Multi AV Scanner detection
for dropped file
49->194
196
Contains functionality
to start a terminal
service
49->196
198
Tries to harvest and
steal ftp login credentials
51->198
200
Tries to harvest and
steal browser information
(history, passwords,
etc)
51->200
120
172.64.80.1
CLOUDFLARENETUS
United States
53->120
122
104.71.182.190
AKAMAI-ASUS
United States
55->122
124
104.21.85.96
CLOUDFLARENETUS
United States
57->124
file13
signatures14
process15
dnsIp16
128
104.168.28.10
AS-COLOCROSSINGUS
United States
61->128
130
127.0.0.1
unknown
unknown
61->130
98
C:\Windows\Temp\pc929p8U_6508.sys, PE32+
61->98
dropped
202
Multi AV Scanner detection
for dropped file
61->202
204
Query firmware table
information (likely
to detect VMs)
61->204
206
Sample is not signed
and drops a device driver
61->206
210
2 other signatures
61->210
208
Loading BitLocker PowerShell
Module
68->208
file17
signatures18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.