Threat name:
LummaC, Amadey, Babadeda, DanaBot, KeyLo
Alert
Classification:
phis.troj.spyw.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May use the Tor software to hide its network traffic
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected BrowserPasswordDump
Yara detected DanaBot stealer dll
Yara detected Generic Downloader
Yara detected Keylogger Generic
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Poverty Stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected StormKitty Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1589502
Sample:
UWYXurYZ2x.exe
Startdate:
12/01/2025
Architecture:
WINDOWS
Score:
100
120
wholersorie.shop
2->120
122
plodnittpw.lat
2->122
124
23 other IPs or domains
2->124
154
Suricata IDS alerts
for network traffic
2->154
156
Found malware configuration
2->156
158
Malicious sample detected
(through community Yara
rule)
2->158
160
28 other signatures
2->160
13
skotes.exe
2
50
2->13
started
18
UWYXurYZ2x.exe
5
2->18
started
20
skotes.exe
2->20
started
22
3 other processes
2->22
signatures3
process4
dnsIp5
146
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
13->146
148
185.215.113.43, 49973, 49974, 80
WHOLESALECONNECTIONSNL
Portugal
13->148
152
2 other IPs or domains
13->152
100
C:\Users\user\AppData\...\eb15c414be.exe, PE32
13->100
dropped
102
C:\Users\user\AppData\...\fe4d890d0f.exe, PE32
13->102
dropped
104
C:\Users\user\AppData\...\b2ee16741f.exe, PE32
13->104
dropped
110
19 other malicious files
13->110
dropped
192
Creates multiple autostart
registry keys
13->192
194
Hides threads from debuggers
13->194
196
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
13->196
24
bKIFsVe.exe
13->24
started
28
fe4d890d0f.exe
13->28
started
30
usPaQ3D.exe
1
26
13->30
started
34
8 other processes
13->34
106
C:\Users\user\AppData\Local\...\skotes.exe, PE32
18->106
dropped
108
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
18->108
dropped
198
Detected unpacking (changes
PE section rights)
18->198
200
Tries to evade debugger
and weak emulator (self
modifying code)
18->200
202
Tries to detect virtualization
through RDTSC time measurements
18->202
204
Potentially malicious
time measurement code
found
18->204
32
skotes.exe
18->32
started
206
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
20->206
150
127.0.0.1
unknown
unknown
22->150
file6
signatures7
process8
dnsIp9
134
marka4.cyou
116.203.166.124
HETZNER-ASDE
Germany
24->134
136
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
24->136
162
Antivirus detection
for dropped file
24->162
164
Multi AV Scanner detection
for dropped file
24->164
166
Detected unpacking (changes
PE section rights)
24->166
180
2 other signatures
24->180
36
chrome.exe
24->36
started
138
plodnittpw.lat
172.67.161.160
CLOUDFLARENETUS
United States
28->138
168
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
28->168
170
Machine Learning detection
for dropped file
28->170
182
2 other signatures
28->182
140
157.20.182.24
FCNUniversityPublicCorporationOsakaJP
unknown
30->140
172
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
30->172
174
Found many strings related
to Crypto-Wallets (likely
being stolen)
30->174
176
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
30->176
184
3 other signatures
32->184
142
194.32.76.77
MVPShttpswwwmvpsnetEU
Germany
34->142
144
45.76.251.57
AS-CHOOPAUS
United States
34->144
178
Detected unpacking (overwrites
its own PE header)
34->178
186
5 other signatures
34->186
39
cmd.exe
34->39
started
41
cmd.exe
34->41
started
45
HNsLLEj.exe
34->45
started
47
4 other processes
34->47
signatures10
process11
dnsIp12
126
239.255.255.250
unknown
Reserved
36->126
49
chrome.exe
36->49
started
52
cmd.exe
39->52
started
54
conhost.exe
39->54
started
98
C:\Temp\2alGwEWbJ.hta, HTML
41->98
dropped
188
Creates HTA files
41->188
56
cmd.exe
41->56
started
58
cmd.exe
41->58
started
60
cmd.exe
41->60
started
62
4 other processes
41->62
128
185.244.212.106
M247GB
Romania
45->128
190
Tries to harvest and
steal browser information
(history, passwords,
etc)
45->190
130
misha-lomonosov.com
104.21.14.233
CLOUDFLARENETUS
United States
47->130
132
steamcommunity.com
104.102.49.254
AKAMAI-ASUS
United States
47->132
file13
signatures14
process15
dnsIp16
114
play.google.com
142.250.184.206
GOOGLEUS
United States
49->114
116
plus.l.google.com
172.217.16.142
GOOGLEUS
United States
49->116
118
2 other IPs or domains
49->118
64
5f6d06eefa.exe
52->64
started
66
conhost.exe
52->66
started
68
powershell.exe
56->68
started
70
powershell.exe
58->70
started
72
powershell.exe
60->72
started
74
powershell.exe
62->74
started
76
powershell.exe
62->76
started
process17
process18
78
cmd.exe
64->78
started
file19
112
C:\Temp\Pn8FljxwM.hta, HTML
78->112
dropped
208
Creates HTA files
78->208
82
cmd.exe
78->82
started
84
cmd.exe
78->84
started
86
cmd.exe
78->86
started
88
4 other processes
78->88
signatures20
process21
process22
90
powershell.exe
82->90
started
92
powershell.exe
84->92
started
94
powershell.exe
86->94
started
96
powershell.exe
88->96
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.