Threat name:
Amadey, LummaC Stealer, Vidar, Xmrig, RHADAMANTHYS, Vi
Alert
Classification:
troj.spyw.expl.evad.mine.adwa
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Compiles code for process injection (via .Net compiler)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Uses netstat to query active network connections and open ports
Uses the Telegram API (likely for C&C communication)
Uses threadpools to delay analysis
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell decode and execute
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1706905
Sample:
random.exe
Startdate:
05/06/2025
Architecture:
WINDOWS
Score:
100
133
api.telegram.org
2->133
135
lepidobdkn.digital
2->135
137
12 other IPs or domains
2->137
157
Suricata IDS alerts
for network traffic
2->157
159
Found malware configuration
2->159
161
Malicious sample detected
(through community Yara
rule)
2->161
165
21 other signatures
2->165
13
random.exe
1
2->13
started
18
varen.exe
2->18
started
20
ramez.exe
2->20
started
22
2 other processes
2->22
signatures3
163
Uses the Telegram API
(likely for C&C
communication)
133->163
process4
dnsIp5
153
185.156.72.2, 49692, 49710, 49718
ITDELUXE-ASRU
Russian Federation
13->153
155
lepidobdkn.digital
195.82.147.188, 443, 49681, 49682
DREAMTORRENT-CORP-ASRU
Russian Federation
13->155
119
C:\Users\user\...\5RPH2E6JV52LEFF2PS.exe, PE32
13->119
dropped
227
Detected unpacking (changes
PE section rights)
13->227
229
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
13->229
231
Query firmware table
information (likely
to detect VMs)
13->231
237
7 other signatures
13->237
24
5RPH2E6JV52LEFF2PS.exe
4
13->24
started
121
C:\Users\user\AppData\...\c2aa044c71.exe, PE32
18->121
dropped
123
C:\Users\user\AppData\Local\...\random[1].exe, PE32
18->123
dropped
233
Contains functionality
to start a terminal
service
18->233
28
c2aa044c71.exe
18->28
started
235
Hides threads from debuggers
20->235
31
NETSTAT.EXE
22->31
started
file6
signatures7
process8
dnsIp9
109
C:\Users\user\AppData\Local\...\ramez.exe, Unknown
24->109
dropped
217
Detected unpacking (changes
PE section rights)
24->217
219
Contains functionality
to start a terminal
service
24->219
221
Found stalling execution
ending in API Sleep
call
24->221
225
2 other signatures
24->225
33
ramez.exe
54
24->33
started
145
185.156.72.196
ITDELUXE-ASRU
Russian Federation
28->145
147
drive.usercontent.google.com
142.250.114.132
GOOGLEUS
United States
28->147
111
C:\Users\user\AppData\Local\Temp\...\YCL.exe, PE32
28->111
dropped
113
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
28->113
dropped
115
C:\Users\user\AppData\Local\...\dll[1], PE32
28->115
dropped
117
C:\Users\user\AppData\Local\...\soft[1], PE32
28->117
dropped
223
Multi AV Scanner detection
for dropped file
28->223
149
23.95.245.178
AS-COLOCROSSINGUS
United States
31->149
151
127.0.0.1
unknown
unknown
31->151
38
conhost.exe
31->38
started
file10
signatures11
process12
dnsIp13
129
185.156.72.61, 49734, 49738, 49741
ITDELUXE-ASRU
Russian Federation
33->129
131
185.156.72.96, 49693, 49694, 49695
ITDELUXE-ASRU
Russian Federation
33->131
97
C:\Users\user\AppData\...\68eced0540.exe, PE32
33->97
dropped
99
C:\Users\user\AppData\...\551a309aa0.exe, PE32
33->99
dropped
101
C:\Users\user\AppData\Local\...\08IyOOF.exe, PE32+
33->101
dropped
103
24 other malicious files
33->103
dropped
167
Detected unpacking (changes
PE section rights)
33->167
169
Hides threads from debuggers
33->169
40
8f2lGlV.exe
33->40
started
43
Md7DcfL.exe
33->43
started
45
tdxVgQi.exe
1
33->45
started
47
7 other processes
33->47
file14
signatures15
process16
dnsIp17
189
Multi AV Scanner detection
for dropped file
40->189
191
Found many strings related
to Crypto-Wallets (likely
being stolen)
40->191
193
Encrypted powershell
cmdline option found
40->193
207
2 other signatures
40->207
51
8f2lGlV.exe
40->51
started
195
Writes to foreign memory
regions
43->195
197
Allocates memory in
foreign processes
43->197
199
Injects a PE file into
a foreign processes
43->199
55
MSBuild.exe
43->55
started
67
4 other processes
43->67
57
MSBuild.exe
45->57
started
59
conhost.exe
45->59
started
127
179.43.141.35
PLI-ASCH
Panama
47->127
125
C:\Users\user\AppData\Local\...\varen.exe, PE32
47->125
dropped
201
Antivirus detection
for dropped file
47->201
203
Early bird code injection
technique detected
47->203
205
Contains functionality
to start a terminal
service
47->205
209
6 other signatures
47->209
61
MSBuild.exe
47->61
started
63
MSBuild.exe
47->63
started
65
MSBuild.exe
47->65
started
69
4 other processes
47->69
file18
signatures19
process20
dnsIp21
139
51.e1.4t.com
116.202.3.169
HETZNER-ASDE
Germany
51->139
171
Encrypted powershell
cmdline option found
51->171
71
powershell.exe
51->71
started
75
powershell.exe
51->75
started
77
chrome.exe
51->77
started
79
3 other processes
51->79
173
Query firmware table
information (likely
to detect VMs)
55->173
175
Tries to harvest and
steal browser information
(history, passwords,
etc)
55->175
177
Tries to steal Crypto
Currency Wallets
55->177
179
Tries to steal from
password manager
55->179
181
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
57->181
183
Tries to harvest and
steal ftp login credentials
61->183
141
t.me
149.154.167.99, 443, 49722, 49735
TELEGRAMRU
United Kingdom
63->141
185
Multi AV Scanner detection
for dropped file
69->185
187
Contains functionality
to start a terminal
service
69->187
signatures22
process23
file24
105
C:\Users\user\AppData\...\ydhkvy22.cmdline, Unicode
71->105
dropped
211
Writes to foreign memory
regions
71->211
213
Compiles code for process
injection (via .Net
compiler)
71->213
215
Creates a thread in
another existing process
(thread injection)
71->215
81
csc.exe
71->81
started
84
conhost.exe
71->84
started
107
C:\Users\user\AppData\Local\...\4vqclkn2.0.cs, Unicode
75->107
dropped
86
conhost.exe
75->86
started
88
chrome.exe
77->88
started
91
conhost.exe
79->91
started
signatures25
process26
dnsIp27
95
C:\Users\user\AppData\Local\...\ydhkvy22.dll, PE32
81->95
dropped
93
cvtres.exe
81->93
started
143
www.google.com
142.250.113.105
GOOGLEUS
United States
88->143
file28
process29
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.