Threat name:
LummaC, Amadey, LummaC Stealer, Stealc,
Alert
Classification:
troj.spyw.evad
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the document folder of the user
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1583232
Sample:
random(4).exe
Startdate:
02/01/2025
Architecture:
WINDOWS
Score:
100
161
Found malware configuration
2->161
163
Malicious sample detected
(through community Yara
rule)
2->163
165
Antivirus detection
for dropped file
2->165
167
18 other signatures
2->167
11
random(4).exe
2
2->11
started
16
6319f0cc28.exe
2->16
started
18
skotes.exe
2->18
started
20
6 other processes
2->20
process3
dnsIp4
139
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
11->139
141
104.21.48.1
CLOUDFLARENETUS
United States
11->141
117
C:\Users\...117U4SX64NXMV3YXYV8G3PIA0S0.exe, PE32
11->117
dropped
119
C:\...\7L2IH7SHMJ2UHKK6X5B1EYK6W8VN0.exe, PE32
11->119
dropped
197
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
11->197
199
Query firmware table
information (likely
to detect VMs)
11->199
201
Found many strings related
to Crypto-Wallets (likely
being stolen)
11->201
215
2 other signatures
11->215
22
7L2IH7SHMJ2UHKK6X5B1EYK6W8VN0.exe
4
11->22
started
26
NU4SX64NXMV3YXYV8G3PIA0S0.exe
37
11->26
started
203
Tries to harvest and
steal ftp login credentials
16->203
205
Tries to harvest and
steal browser information
(history, passwords,
etc)
16->205
207
Tries to steal Crypto
Currency Wallets
16->207
209
Hides threads from debuggers
18->209
211
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
18->211
213
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
18->213
29
taskkill.exe
20->29
started
file5
signatures6
process7
dnsIp8
91
C:\Users\user\AppData\Local\...\skotes.exe, PE32
22->91
dropped
169
Detected unpacking (changes
PE section rights)
22->169
171
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
22->171
173
Tries to evade debugger
and weak emulator (self
modifying code)
22->173
181
4 other signatures
22->181
31
skotes.exe
4
64
22->31
started
135
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
26->135
137
127.0.0.1
unknown
unknown
26->137
93
C:\Users\user\Documents\FIJDGIJJKE.exe, PE32
26->93
dropped
95
C:\Users\user\AppData\...\softokn3[1].dll, PE32
26->95
dropped
97
C:\Users\user\AppData\Local\...\random[2].exe, PE32
26->97
dropped
99
11 other files (7 malicious)
26->99
dropped
175
Multi AV Scanner detection
for dropped file
26->175
177
Attempt to bypass Chrome
Application-Bound Encryption
26->177
179
Drops PE files to the
document folder of the
user
26->179
183
7 other signatures
26->183
36
cmd.exe
26->36
started
38
chrome.exe
26->38
started
40
conhost.exe
29->40
started
file9
signatures10
process11
dnsIp12
143
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
31->143
145
172.67.129.178
CLOUDFLARENETUS
United States
31->145
147
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
31->147
83
C:\Users\user\AppData\...\ad8a3a5306.exe, PE32
31->83
dropped
85
C:\Users\user\AppData\...\8a0ebcc2e0.exe, PE32
31->85
dropped
87
C:\Users\user\AppData\...\a48f6ed5ed.exe, PE32
31->87
dropped
89
23 other malicious files
31->89
dropped
153
Detected unpacking (changes
PE section rights)
31->153
155
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
31->155
157
Creates HTML files with
.exe extension (expired
dropper behavior)
31->157
159
5 other signatures
31->159
42
982cf429c9.exe
31->42
started
45
8a0ebcc2e0.exe
31->45
started
48
6319f0cc28.exe
31->48
started
57
10 other processes
31->57
50
FIJDGIJJKE.exe
36->50
started
52
conhost.exe
36->52
started
149
192.168.2.4
unknown
unknown
38->149
151
239.255.255.250
unknown
Reserved
38->151
54
chrome.exe
38->54
started
file13
signatures14
process15
dnsIp16
101
C:\Users\...\win32trace.cp310-win_amd64.pyd, PE32+
42->101
dropped
103
C:\Users\...\win32api.cp310-win_amd64.pyd, PE32+
42->103
dropped
105
C:\...\_win32sysloader.cp310-win_amd64.pyd, PE32+
42->105
dropped
113
69 other files (66 malicious)
42->113
dropped
59
982cf429c9.exe
42->59
started
217
Detected unpacking (changes
PE section rights)
45->217
219
Modifies windows update
settings
45->219
221
Disables Windows Defender
Tamper protection
45->221
237
3 other signatures
45->237
223
Multi AV Scanner detection
for dropped file
48->223
225
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
48->225
227
Query firmware table
information (likely
to detect VMs)
48->227
229
Tries to evade debugger
and weak emulator (self
modifying code)
50->229
239
2 other signatures
50->239
123
142.250.185.174
GOOGLEUS
United States
54->123
125
142.250.186.110
GOOGLEUS
United States
54->125
133
7 other IPs or domains
54->133
127
176.53.146.223
VANNINVENTURESGB
United Kingdom
57->127
129
185.156.73.23
RELDAS-NETRU
Russian Federation
57->129
131
34.197.122.172
AMAZON-AESUS
United States
57->131
107
C:\Users\user\AppData\...\AutoIt3_x64.exe, PE32+
57->107
dropped
109
C:\Users\user\AppData\...\AutoIt3_x64.exe, PE32+
57->109
dropped
111
C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32
57->111
dropped
115
3 other files (none is malicious)
57->115
dropped
231
Contains functionality
to inject code into
remote processes
57->231
233
Adds a directory exclusion
to Windows Defender
57->233
235
Tries to steal Crypto
Currency Wallets
57->235
241
2 other signatures
57->241
62
AutoIt3_x64.exe
57->62
started
64
9ce3a8a3dc.exe
57->64
started
67
AutoIt3_x64.exe
57->67
started
69
7 other processes
57->69
file17
signatures18
process19
dnsIp20
185
Hides threads from debuggers
59->185
71
cmd.exe
59->71
started
187
Loading BitLocker PowerShell
Module
62->187
189
Reads the Security eventlog
62->189
191
Reads the System eventlog
62->191
121
188.114.97.3
CLOUDFLARENETUS
European Union
64->121
193
Query firmware table
information (likely
to detect VMs)
64->193
195
Tries to steal Crypto
Currency Wallets
64->195
73
conhost.exe
69->73
started
75
conhost.exe
69->75
started
77
WmiPrvSE.exe
69->77
started
79
3 other processes
69->79
signatures21
process22
process23
81
conhost.exe
71->81
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.