Threat name:
Amadey, Credential Flusher, LummaC Steal
Alert
Classification:
phis.troj.spyw.expl.evad
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Compiles code to access protected / encrypted code
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1604018
Sample:
random.exe
Startdate:
31/01/2025
Architecture:
WINDOWS
Score:
100
111
warlikedbeliev.org
2->111
113
prod.classify-client.prod.webservices.mozgcp.net
2->113
131
Suricata IDS alerts
for network traffic
2->131
133
Found malware configuration
2->133
135
Antivirus detection
for URL or domain
2->135
137
27 other signatures
2->137
10
skotes.exe
4
28
2->10
started
15
random.exe
5
2->15
started
17
4d34ee83c3.exe
2->17
started
19
6 other processes
2->19
signatures3
process4
dnsIp5
125
185.215.113.16, 53507, 80
WHOLESALECONNECTIONSNL
Portugal
10->125
127
185.215.113.43, 53374, 53391, 53407
WHOLESALECONNECTIONSNL
Portugal
10->127
129
185.215.113.97, 53502, 80
WHOLESALECONNECTIONSNL
Portugal
10->129
97
C:\Users\user\AppData\...\ebd18831ab.exe, PE32
10->97
dropped
99
C:\Users\user\AppData\...\166a6b71ae.exe, PE32
10->99
dropped
101
C:\Users\user\AppData\...\c1f949fcc5.exe, PE32
10->101
dropped
109
7 other malicious files
10->109
dropped
187
Creates multiple autostart
registry keys
10->187
189
Hides threads from debuggers
10->189
191
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->191
21
4d34ee83c3.exe
2
10->21
started
26
ebd18831ab.exe
10->26
started
28
c1f949fcc5.exe
13
10->28
started
36
2 other processes
10->36
103
C:\Users\user\AppData\Local\...\skotes.exe, PE32
15->103
dropped
105
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
15->105
dropped
193
Detected unpacking (changes
PE section rights)
15->193
195
Tries to evade debugger
and weak emulator (self
modifying code)
15->195
197
Tries to detect virtualization
through RDTSC time measurements
15->197
30
skotes.exe
15->30
started
199
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->199
201
Tries to steal Crypto
Currency Wallets
17->201
203
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->203
107
C:\Users\user\AppData\Local\...\DJHkebHz8.hta, HTML
19->107
dropped
205
Binary is likely a compiled
AutoIt script file
19->205
32
firefox.exe
19->32
started
34
taskkill.exe
19->34
started
file6
signatures7
process8
dnsIp9
115
warlikedbeliev.org
104.21.18.116
CLOUDFLARENETUS
United States
21->115
85
C:\Users\user\...\WMAZNZ1GJIIOLDTVF0NW.exe, PE32
21->85
dropped
87
C:\Users\user\...\JTL0ZKOYHQDFV52QDC9N79.exe, PE32
21->87
dropped
159
Antivirus detection
for dropped file
21->159
161
Detected unpacking (changes
PE section rights)
21->161
163
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
21->163
181
4 other signatures
21->181
38
WMAZNZ1GJIIOLDTVF0NW.exe
21->38
started
41
JTL0ZKOYHQDFV52QDC9N79.exe
21->41
started
89
C:\Users\user\AppData\Local\...\bqCiABWfm.hta, HTML
26->89
dropped
165
Binary is likely a compiled
AutoIt script file
26->165
167
Machine Learning detection
for dropped file
26->167
169
Creates HTA files
26->169
43
mshta.exe
26->43
started
45
cmd.exe
26->45
started
117
185.215.113.115
WHOLESALECONNECTIONSNL
Portugal
28->117
183
3 other signatures
28->183
171
Multi AV Scanner detection
for dropped file
30->171
173
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
30->173
175
Tries to evade debugger
and weak emulator (self
modifying code)
30->175
177
Potentially malicious
time measurement code
found
30->177
119
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
GOOGLEUS
United States
32->119
121
127.0.0.1
unknown
unknown
32->121
54
2 other processes
32->54
47
conhost.exe
34->47
started
123
147.45.44.42, 53503, 80
FREE-NET-ASFREEnetEU
Russian Federation
36->123
91
C:\Users\user\AppData\...\wcv0bljh.cmdline, Unicode
36->91
dropped
93
C:\Users\user\AppData\Local\...\wcv0bljh.0.cs, Unicode
36->93
dropped
179
Compiles code to access
protected / encrypted
code
36->179
49
csc.exe
3
36->49
started
52
taskkill.exe
36->52
started
56
6 other processes
36->56
file10
signatures11
process12
file13
139
Antivirus detection
for dropped file
38->139
141
Detected unpacking (changes
PE section rights)
38->141
143
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
38->143
157
2 other signatures
38->157
145
Machine Learning detection
for dropped file
41->145
147
Tries to evade debugger
and weak emulator (self
modifying code)
41->147
149
Hides threads from debuggers
41->149
151
Suspicious powershell
command line found
43->151
153
Tries to download and
execute files (via powershell)
43->153
58
powershell.exe
43->58
started
155
Uses schtasks.exe or
at.exe to add and modify
task schedules
45->155
62
conhost.exe
45->62
started
64
schtasks.exe
45->64
started
83
C:\Users\user\AppData\Local\...\wcv0bljh.dll, PE32
49->83
dropped
66
conhost.exe
49->66
started
68
cvtres.exe
1
49->68
started
70
conhost.exe
52->70
started
72
conhost.exe
56->72
started
74
conhost.exe
56->74
started
76
2 other processes
56->76
signatures14
process15
file16
95
TempI4MEZTEWDOYUCNM2HHE6Q7DZWJW0GXKE.EXE, PE32
58->95
dropped
185
Powershell drops PE
file
58->185
78
TempI4MEZTEWDOYUCNM2HHE6Q7DZWJW0GXKE.EXE
58->78
started
81
conhost.exe
58->81
started
signatures17
process18
signatures19
207
Antivirus detection
for dropped file
78->207
209
Detected unpacking (changes
PE section rights)
78->209
211
Machine Learning detection
for dropped file
78->211
213
4 other signatures
78->213
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.