Threat name:
Amadey, Go Injector, LummaC Stealer, Pho
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if Internet connection is working
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Search for Antivirus process
Sigma detected: Stop multiple services
Stops critical windows services
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Go Injector
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1526331
Sample:
bomb.exe
Startdate:
05/10/2024
Architecture:
WINDOWS
Score:
100
156
Multi AV Scanner detection
for domain / URL
2->156
158
Found malware configuration
2->158
160
Malicious sample detected
(through community Yara
rule)
2->160
162
27 other signatures
2->162
10
bomb.exe
14
33
2->10
started
15
svchost.exe
2->15
started
17
svchost.exe
2->17
started
19
2 other processes
2->19
process3
dnsIp4
140
185.215.113.66
WHOLESALECONNECTIONSNL
Portugal
10->140
142
147.45.44.104
FREE-NET-ASFREEnetEU
Russian Federation
10->142
148
4 other IPs or domains
10->148
114
httpmales.mugutu.c...5efe38_lyla.exe.exe, PE32
10->114
dropped
116
httpmales.mugutu.c...0354a7_Burn.exe.exe, PE32
10->116
dropped
118
httpmales.mugutu.c...BitcoinCore.exe.exe, PE32+
10->118
dropped
120
24 other malicious files
10->120
dropped
216
Found many strings related
to Crypto-Wallets (likely
being stolen)
10->216
218
Found strings related
to Crypto-Mining
10->218
220
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
10->220
21
httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe
10->21
started
24
http185.215.113.66pei.exe.exe
16
10->24
started
27
http77.105.161.194file1.exe.exe
10->27
started
31
8 other processes
10->31
29
WerFault.exe
15->29
started
144
184.28.90.27
AKAMAI-ASUS
United States
17->144
146
127.0.0.1
unknown
unknown
17->146
file5
signatures6
process7
dnsIp8
188
Writes to foreign memory
regions
21->188
190
Allocates memory in
foreign processes
21->190
192
Injects a PE file into
a foreign processes
21->192
34
MSBuild.exe
1
249
21->34
started
39
MSBuild.exe
21->39
started
41
WerFault.exe
21->41
started
100
C:\Users\user\AppData\Local\...\323057790.exe, PE32
24->100
dropped
102
C:\Users\user\AppData\Local\...\newtpp[1].exe, PE32
24->102
dropped
194
Multi AV Scanner detection
for dropped file
24->194
196
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
24->196
43
323057790.exe
24->43
started
45
cmd.exe
27->45
started
150
142.250.185.78
GOOGLEUS
United States
31->150
152
216.58.212.132
GOOGLEUS
United States
31->152
154
188.114.97.3
CLOUDFLARENETUS
European Union
31->154
104
C:\Windows\sysvplervcs.exe, PE32
31->104
dropped
198
Found evasive API chain
(may stop execution
after checking mutex)
31->198
200
Contains functionality
to check if Internet
connection is working
31->200
202
Found many strings related
to Crypto-Wallets (likely
being stolen)
31->202
204
2 other signatures
31->204
47
RegSvcs.exe
31->47
started
49
sysvplervcs.exe
31->49
started
51
conhost.exe
31->51
started
53
RegAsm.exe
31->53
started
file9
signatures10
process11
dnsIp12
122
45.132.206.251
LIFELINK-ASRU
Russian Federation
34->122
124
141.98.233.156
CH-NET-ASRO
Russian Federation
34->124
88
C:\Users\user\AppData\...\freebl3[1].dll, PE32
34->88
dropped
90
C:\Users\user\AppData\...\a43486128347[1].exe, PE32
34->90
dropped
92
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
34->92
dropped
98
12 other files (8 malicious)
34->98
dropped
164
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
34->164
166
Found many strings related
to Crypto-Wallets (likely
being stolen)
34->166
168
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
34->168
184
4 other signatures
34->184
170
Contains functionality
to inject code into
remote processes
39->170
172
Searches for specific
processes (likely to
inject)
39->172
126
20.189.173.20
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
41->126
94
C:\Users\user\sysvplervcs.exe, PE32
43->94
dropped
174
Drops PE files to the
user root directory
43->174
176
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
43->176
55
sysvplervcs.exe
43->55
started
96
C:\Users\user\AppData\Local\...\Batch.pif, PE32
45->96
dropped
178
Drops PE files with
a suspicious file extension
45->178
180
Adds a directory exclusion
to Windows Defender
45->180
182
Stops critical windows
services
45->182
60
Batch.pif
45->60
started
62
cmd.exe
45->62
started
64
conhost.exe
45->64
started
66
7 other processes
45->66
128
45.202.35.101
ONL-HKOCEANNETWORKLIMITEDHK
Seychelles
47->128
file13
signatures14
process15
dnsIp16
130
91.202.233.141
M247GB
Russian Federation
55->130
132
198.163.193.244
WINDSTREAMUS
United States
55->132
138
73 other IPs or domains
55->138
106
C:\Users\user\AppData\Local\...\454830019.exe, PE32+
55->106
dropped
108
C:\Users\user\AppData\...\1534331641.exe, PE32
55->108
dropped
110
C:\Users\user\AppData\...\1037419404.exe, PE32
55->110
dropped
112
4 other malicious files
55->112
dropped
206
Changes security center
settings (notifications,
updates, antivirus,
firewall)
55->206
208
Adds a directory exclusion
to Windows Defender
55->208
210
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
55->210
68
cmd.exe
55->68
started
71
cmd.exe
55->71
started
134
49.12.197.9
HETZNER-ASDE
Germany
60->134
136
104.102.49.254
AKAMAI-ASUS
United States
60->136
212
Tries to harvest and
steal browser information
(history, passwords,
etc)
60->212
73
Conhost.exe
62->73
started
file17
signatures18
process19
signatures20
186
Adds a directory exclusion
to Windows Defender
68->186
75
powershell.exe
68->75
started
78
conhost.exe
68->78
started
80
conhost.exe
71->80
started
82
sc.exe
71->82
started
84
sc.exe
71->84
started
86
3 other processes
71->86
process21
signatures22
214
Loading BitLocker PowerShell
Module
75->214
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.