Threat name:
LummaC, Amadey, LummaC Stealer, PureLog
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1585286
Sample:
file.exe
Startdate:
07/01/2025
Architecture:
WINDOWS
Score:
100
148
Found malware configuration
2->148
150
Antivirus detection
for URL or domain
2->150
152
Antivirus detection
for dropped file
2->152
154
19 other signatures
2->154
9
skotes.exe
4
81
2->9
started
14
file.exe
5
2->14
started
16
skotes.exe
2->16
started
18
5 other processes
2->18
process3
dnsIp4
136
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
9->136
138
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
9->138
140
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
9->140
106
C:\Users\user\AppData\...\a0d135de95.exe, PE32
9->106
dropped
108
C:\Users\user\AppData\...\4e6501ac3b.exe, PE32
9->108
dropped
110
C:\Users\user\AppData\...\54d18f4f90.exe, PE32
9->110
dropped
116
31 other malicious files
9->116
dropped
198
Creates multiple autostart
registry keys
9->198
200
Hides threads from debuggers
9->200
202
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
9->202
20
c061393b55.exe
106
9->20
started
24
05c06146f2.exe
9->24
started
27
cf4bd6029c.exe
9->27
started
33
6 other processes
9->33
112
C:\Users\user\AppData\Local\...\skotes.exe, PE32
14->112
dropped
114
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
14->114
dropped
204
Detected unpacking (changes
PE section rights)
14->204
206
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
14->206
208
Tries to evade debugger
and weak emulator (self
modifying code)
14->208
210
Tries to detect virtualization
through RDTSC time measurements
14->210
29
skotes.exe
14->29
started
212
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
16->212
31
firefox.exe
18->31
started
file5
signatures6
process7
dnsIp8
86
C:\Users\user\AppData\...\win32crypt.pyd, PE32+
20->86
dropped
88
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
20->88
dropped
90
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
20->90
dropped
100
67 other malicious files
20->100
dropped
156
Multi AV Scanner detection
for dropped file
20->156
158
Found pyInstaller with
non standard icon
20->158
35
c061393b55.exe
12
20->35
started
128
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
24->128
92
C:\Users\user\AppData\...\softokn3[1].dll, PE32
24->92
dropped
94
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
24->94
dropped
102
10 other files (6 malicious)
24->102
dropped
160
Attempt to bypass Chrome
Application-Bound Encryption
24->160
176
5 other signatures
24->176
40
msedge.exe
24->40
started
42
chrome.exe
24->42
started
96
C:\Users\user\...\ITH3569MCVRCZNYE5XQ77V.exe, PE32
27->96
dropped
98
C:\Users\user\...\F92YSIFAGW8CC4SRE.exe, PE32
27->98
dropped
162
Detected unpacking (changes
PE section rights)
27->162
164
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
27->164
166
Query firmware table
information (likely
to detect VMs)
27->166
168
Tries to steal Crypto
Currency Wallets
27->168
170
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
29->170
178
2 other signatures
29->178
44
firefox.exe
31->44
started
130
185.156.73.23
RELDAS-NETRU
Russian Federation
33->130
132
104.21.112.1
CLOUDFLARENETUS
United States
33->132
134
104.102.49.254
AKAMAI-ASUS
United States
33->134
172
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
33->172
174
Contains functionality
to inject code into
remote processes
33->174
180
7 other signatures
33->180
46
db0740f8e4.exe
33->46
started
48
WerFault.exe
33->48
started
50
taskkill.exe
33->50
started
52
7 other processes
33->52
file9
signatures10
process11
dnsIp12
118
149.154.167.220
TELEGRAMRU
United Kingdom
35->118
120
104.26.9.59
CLOUDFLARENETUS
United States
35->120
122
127.0.0.1
unknown
unknown
35->122
104
C:\Users\user\AppData\Local\...\passwords.db, SQLite
35->104
dropped
182
Tries to harvest and
steal browser information
(history, passwords,
etc)
35->182
54
cmd.exe
35->54
started
56
chrome.exe
35->56
started
58
taskkill.exe
35->58
started
68
3 other processes
35->68
184
Monitors registry run
keys for changes
40->184
124
188.114.96.3
CLOUDFLARENETUS
European Union
46->124
186
Query firmware table
information (likely
to detect VMs)
46->186
188
Found many strings related
to Crypto-Wallets (likely
being stolen)
46->188
190
Tries to steal Crypto
Currency Wallets
46->190
126
20.42.65.92
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
48->126
60
conhost.exe
50->60
started
62
conhost.exe
52->62
started
64
conhost.exe
52->64
started
66
conhost.exe
52->66
started
70
2 other processes
52->70
file13
signatures14
process15
process16
72
dxdiag.exe
54->72
started
75
conhost.exe
54->75
started
77
chrome.exe
56->77
started
80
conhost.exe
58->80
started
82
conhost.exe
68->82
started
84
chrome.exe
68->84
started
dnsIp17
192
Query firmware table
information (likely
to detect VMs)
72->192
194
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
72->194
196
Queries sensitive service
information (via WMI,
Win32_LogicalDisk, often
done to detect sandboxes)
72->196
142
142.250.185.163
GOOGLEUS
United States
77->142
144
142.250.185.206
GOOGLEUS
United States
77->144
146
2 other IPs or domains
77->146
signatures18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.