Threat name:
Amadey, LummaC Stealer, PureLog Stealer,
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1604917
Sample:
JmjZxSWBKZ.exe
Startdate:
02/02/2025
Architecture:
WINDOWS
Score:
100
147
thebeautylovelytop.top
2->147
149
rebuildhurrte.com
2->149
151
20 other IPs or domains
2->151
187
Suricata IDS alerts
for network traffic
2->187
189
Found malware configuration
2->189
191
Malicious sample detected
(through community Yara
rule)
2->191
193
29 other signatures
2->193
11
skotes.exe
6
51
2->11
started
16
JmjZxSWBKZ.exe
5
2->16
started
18
647f85b778.exe
2->18
started
20
8 other processes
2->20
signatures3
process4
dnsIp5
161
185.215.113.16, 51180, 51210, 51216
WHOLESALECONNECTIONSNL
Portugal
11->161
163
185.215.113.43, 51167, 51168, 51172
WHOLESALECONNECTIONSNL
Portugal
11->163
165
185.215.113.97, 51169, 80
WHOLESALECONNECTIONSNL
Portugal
11->165
131
C:\Users\user\AppData\...\7805eeff37.exe, PE32
11->131
dropped
133
C:\Users\user\AppData\...\877c7945c9.exe, PE32
11->133
dropped
135
C:\Users\user\AppData\...\228f677111.exe, PE32
11->135
dropped
143
17 other malicious files
11->143
dropped
253
Creates multiple autostart
registry keys
11->253
255
Hides threads from debuggers
11->255
257
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->257
22
647f85b778.exe
11->22
started
26
Cu7fy1C.exe
11->26
started
28
67a8180ac8.exe
11->28
started
39
4 other processes
11->39
137
C:\Users\user\AppData\Local\...\skotes.exe, PE32
16->137
dropped
139
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
16->139
dropped
259
Detected unpacking (changes
PE section rights)
16->259
261
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
16->261
263
Tries to evade debugger
and weak emulator (self
modifying code)
16->263
265
Tries to detect virtualization
through RDTSC time measurements
16->265
31
skotes.exe
16->31
started
141
C:\Users\user\AppData\Local\...\XSnanD8Aq.hta, HTML
18->141
dropped
267
Binary is likely a compiled
AutoIt script file
18->267
269
Creates HTA files
18->269
33
mshta.exe
18->33
started
35
cmd.exe
18->35
started
167
127.0.0.1
unknown
unknown
20->167
271
Suspicious powershell
command line found
20->271
273
Tries to download and
execute files (via powershell)
20->273
275
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
20->275
37
cmd.exe
20->37
started
41
4 other processes
20->41
file6
signatures7
process8
dnsIp9
117
C:\Users\user\AppData\Local\...\7YP8PRJ0Z.hta, HTML
22->117
dropped
203
Binary is likely a compiled
AutoIt script file
22->203
219
2 other signatures
22->219
43
mshta.exe
22->43
started
46
cmd.exe
22->46
started
205
Attempt to bypass Chrome
Application-Bound Encryption
26->205
221
2 other signatures
26->221
50
3 other processes
26->50
169
185.215.113.115
WHOLESALECONNECTIONSNL
Portugal
28->169
119
C:\Users\user\AppData\...\msvcp140[1].dll, PE32
28->119
dropped
121
C:\Users\user\AppData\...\mozglue[1].dll, PE32
28->121
dropped
123
C:\Users\user\AppData\...\freebl3[1].dll, PE32
28->123
dropped
129
3 other malicious files
28->129
dropped
223
5 other signatures
28->223
48
chrome.exe
28->48
started
207
Multi AV Scanner detection
for dropped file
31->207
209
Detected unpacking (changes
PE section rights)
31->209
225
2 other signatures
31->225
211
Suspicious powershell
command line found
33->211
213
Tries to download and
execute files (via powershell)
33->213
53
2 other processes
33->53
56
2 other processes
35->56
125
C:\Temp\XJx1Oyg56.hta, HTML
37->125
dropped
58
6 other processes
37->58
171
warlikedbeliev.org
104.21.18.116, 443, 51303, 51315
CLOUDFLARENETUS
United States
39->171
127
C:\Users\user\AppData\Local\...\U3bNiFCaO.hta, HTML
39->127
dropped
215
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->215
217
Query firmware table
information (likely
to detect VMs)
39->217
227
2 other signatures
39->227
60
5 other processes
39->60
62
3 other processes
41->62
file10
signatures11
process12
dnsIp13
237
Suspicious powershell
command line found
43->237
239
Tries to download and
execute files (via powershell)
43->239
64
powershell.exe
43->64
started
241
Uses schtasks.exe or
at.exe to add and modify
task schedules
46->241
79
2 other processes
46->79
153
t.me
149.154.167.99, 443, 51171
TELEGRAMRU
United Kingdom
50->153
155
getyour.cyou
116.202.5.153, 443, 51179, 51191
HETZNER-ASDE
Germany
50->155
243
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
50->243
245
Found many strings related
to Crypto-Wallets (likely
being stolen)
50->245
247
Tries to harvest and
steal ftp login credentials
50->247
251
3 other signatures
50->251
68
chrome.exe
50->68
started
113
Temp6TBNHOMWDLMDQXFSOOSC5ER6USVBNDUP.EXE, PE32
53->113
dropped
71
Temp6TBNHOMWDLMDQXFSOOSC5ER6USVBNDUP.EXE
53->71
started
73
conhost.exe
53->73
started
81
3 other processes
58->81
115
C:\Temp\jtu0aiosA.hta, HTML
60->115
dropped
249
Creates HTA files
60->249
75
mshta.exe
60->75
started
77
powershell.exe
60->77
started
83
9 other processes
60->83
file14
signatures15
process16
dnsIp17
109
Temp7CQ2KJVWBSIXWDCC4Y1ODWSTLAEI30KO.EXE, PE32
64->109
dropped
173
Powershell drops PE
file
64->173
85
Temp7CQ2KJVWBSIXWDCC4Y1ODWSTLAEI30KO.EXE
64->85
started
88
conhost.exe
64->88
started
157
239.255.255.250
unknown
Reserved
68->157
90
chrome.exe
68->90
started
175
Detected unpacking (changes
PE section rights)
71->175
177
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
71->177
179
Machine Learning detection
for dropped file
71->179
185
4 other signatures
71->185
181
Suspicious powershell
command line found
75->181
183
Tries to download and
execute files (via powershell)
75->183
93
powershell.exe
75->93
started
111
TempUNP7X1DR3BM7RIZMKZBWMCQF9QEXBRZQ.EXE, PE32
77->111
dropped
96
conhost.exe
77->96
started
98
powershell.exe
83->98
started
100
powershell.exe
83->100
started
102
powershell.exe
83->102
started
file18
signatures19
process20
dnsIp21
195
Detected unpacking (changes
PE section rights)
85->195
197
Machine Learning detection
for dropped file
85->197
199
Modifies windows update
settings
85->199
201
7 other signatures
85->201
159
www.google.com
142.250.185.228, 443, 51316
GOOGLEUS
United States
90->159
145
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
93->145
dropped
104
483d2fa8a0d53818306efeb32d3.exe
93->104
started
107
conhost.exe
93->107
started
file22
signatures23
process24
signatures25
229
Detected unpacking (changes
PE section rights)
104->229
231
Tries to evade debugger
and weak emulator (self
modifying code)
104->231
233
Hides threads from debuggers
104->233
235
2 other signatures
104->235
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.