Threat name:
Amadey, Fabookie, LummaC Stealer, PureLo
Alert
Classification:
phis.troj.spyw.evad
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found API chain indicative of sandbox detection
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1386838
Sample:
VtTzu63V0u.exe
Startdate:
05/02/2024
Architecture:
WINDOWS
Score:
100
111
youtube-ui.l.google.com
2->111
113
www.youtube.com
2->113
115
13 other IPs or domains
2->115
147
Snort IDS alert for
network traffic
2->147
149
Found malware configuration
2->149
151
Malicious sample detected
(through community Yara
rule)
2->151
153
22 other signatures
2->153
10
explorgu.exe
3
66
2->10
started
15
VtTzu63V0u.exe
5
2->15
started
17
msedge.exe
2->17
started
19
5 other processes
2->19
signatures3
process4
dnsIp5
141
185.215.113.32
WHOLESALECONNECTIONSNL
Portugal
10->141
143
193.233.132.167
FREE-NET-ASFREEnetEU
Russian Federation
10->143
145
2 other IPs or domains
10->145
99
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
10->99
dropped
101
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
10->101
dropped
103
C:\Users\user\AppData\Local\...\amdyohm.exe, PE32
10->103
dropped
109
32 other malicious files
10->109
dropped
177
Multi AV Scanner detection
for dropped file
10->177
179
Detected unpacking (changes
PE section rights)
10->179
181
Creates multiple autostart
registry keys
10->181
185
2 other signatures
10->185
21
dota.exe
10->21
started
25
plaza.exe
10->25
started
28
rundll32.exe
10->28
started
40
5 other processes
10->40
105
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
15->105
dropped
183
Hides threads from debuggers
15->183
107
C:\Users\user\AppData\Local\...\Login Data, SQLite
17->107
dropped
30
msedge.exe
17->30
started
32
msedge.exe
17->32
started
34
msedge.exe
17->34
started
36
firefox.exe
19->36
started
38
firefox.exe
19->38
started
file6
signatures7
process8
dnsIp9
85
C:\Users\user\...\XunpgmeoLW4w4G2pmslw.exe, PE32
21->85
dropped
87
C:\Users\user\...\VIcDj_5Va5XOhQ1DrzA_.exe, PE32
21->87
dropped
89
C:\Users\user\...\VB9giwMYe3fnIVz6rBL4.exe, PE32
21->89
dropped
97
6 other malicious files
21->97
dropped
155
Detected unpacking (changes
PE section rights)
21->155
157
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
21->157
159
Tries to steal Mail
credentials (via file
/ registry access)
21->159
173
6 other signatures
21->173
127
193.233.132.62
FREE-NET-ASFREEnetEU
Russian Federation
25->127
129
ipinfo.io
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
25->129
91
C:\Users\user\AppData\Local\...\RageMP131.exe, PE32
25->91
dropped
93
C:\ProgramData\MPGPH131\MPGPH131.exe, PE32
25->93
dropped
161
Multi AV Scanner detection
for dropped file
25->161
163
Creates multiple autostart
registry keys
25->163
165
Uses schtasks.exe or
at.exe to add and modify
task schedules
25->165
42
schtasks.exe
25->42
started
44
schtasks.exe
25->44
started
46
rundll32.exe
23
28->46
started
131
20.96.153.111
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
30->131
133
142.250.105.91
GOOGLEUS
United States
30->133
137
16 other IPs or domains
30->137
135
173.194.219.91
GOOGLEUS
United States
36->135
139
4 other IPs or domains
36->139
49
firefox.exe
36->49
started
58
2 other processes
36->58
95
C:\ProgramData\...\uwgxswmtctao.exe, PE32+
40->95
dropped
167
System process connects
to network (likely due
to code injection or
exploit)
40->167
169
Binary is likely a compiled
AutoIt script file
40->169
171
Found API chain indicative
of sandbox detection
40->171
175
3 other signatures
40->175
51
chrome.exe
40->51
started
54
msedge.exe
40->54
started
56
chrome.exe
40->56
started
60
16 other processes
40->60
file10
signatures11
process12
dnsIp13
62
conhost.exe
42->62
started
187
Tries to steal Instant
Messenger accounts or
passwords
46->187
189
Uses netsh to modify
the Windows network
and firewall settings
46->189
191
Tries to harvest and
steal ftp login credentials
46->191
193
2 other signatures
46->193
64
netsh.exe
46->64
started
66
powershell.exe
46->66
started
117
192.168.2.4
unknown
unknown
51->117
119
239.255.255.250
unknown
Reserved
51->119
68
chrome.exe
51->68
started
71
chrome.exe
51->71
started
73
msedge.exe
54->73
started
75
chrome.exe
56->75
started
77
chrome.exe
60->77
started
79
chrome.exe
60->79
started
signatures14
process15
dnsIp16
81
conhost.exe
64->81
started
83
conhost.exe
66->83
started
121
clients.l.google.com
142.250.105.139
GOOGLEUS
United States
68->121
123
static.doubleclick.net
142.250.9.148
GOOGLEUS
United States
68->123
125
23 other IPs or domains
68->125
process17
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.