Threat name:
Amadey, LummaC Stealer, Stealc, Vidar, X
Alert
Classification:
troj.spyw.expl.evad.mine
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Drops PE files to the document folder of the user
Drops VBS files to the startup folder
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Drops script at startup location
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1574051
Sample:
file.exe
Startdate:
12/12/2024
Architecture:
WINDOWS
Score:
100
84
woo097878781.win
2->84
86
pool.hashvault.pro
2->86
88
drive-connect.cyou
2->88
124
Suricata IDS alerts
for network traffic
2->124
126
Found malware configuration
2->126
128
Antivirus detection
for URL or domain
2->128
130
19 other signatures
2->130
9
file.exe
36
2->9
started
14
skotes.exe
19
2->14
started
16
skotes.exe
2->16
started
18
msedge.exe
9
2->18
started
signatures3
process4
dnsIp5
94
185.215.113.16, 49818, 80
WHOLESALECONNECTIONSNL
Portugal
9->94
96
185.215.113.206, 49700, 49742, 49781
WHOLESALECONNECTIONSNL
Portugal
9->96
98
127.0.0.1
unknown
unknown
9->98
64
C:\Users\user\DocumentsBFBFBFIIJ.exe, PE32
9->64
dropped
66
C:\Users\user\AppData\...\softokn3[1].dll, PE32
9->66
dropped
68
C:\Users\user\AppData\Local\...\random[1].exe, PE32
9->68
dropped
78
11 other files (7 malicious)
9->78
dropped
166
Detected unpacking (changes
PE section rights)
9->166
168
Attempt to bypass Chrome
Application-Bound Encryption
9->168
170
Drops PE files to the
document folder of the
user
9->170
184
8 other signatures
9->184
20
cmd.exe
1
9->20
started
22
msedge.exe
2
11
9->22
started
25
chrome.exe
9->25
started
100
185.215.113.43, 49934, 49942, 80
WHOLESALECONNECTIONSNL
Portugal
14->100
102
31.41.244.11, 49946, 80
AEROEXPRESS-ASRU
Russian Federation
14->102
70
C:\Users\user\AppData\...\dc4b23f1bd.exe, PE32
14->70
dropped
72
C:\Users\user\AppData\Local\...\7U5ylzK.exe, PE32+
14->72
dropped
74
C:\Users\user\AppData\...\7U5ylzK[1].exe, PE32+
14->74
dropped
76
C:\Users\user\AppData\Local\...\random[1].exe, PE32
14->76
dropped
172
Hides threads from debuggers
14->172
174
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
14->174
176
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
14->176
28
7U5ylzK.exe
14->28
started
31
dc4b23f1bd.exe
14->31
started
178
Antivirus detection
for dropped file
16->178
180
Machine Learning detection
for dropped file
16->180
182
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
16->182
33
msedge.exe
18->33
started
file6
signatures7
process8
dnsIp9
35
EBFBFBFIIJ.exe
4
20->35
started
39
conhost.exe
20->39
started
148
Monitors registry run
keys for changes
22->148
41
msedge.exe
22->41
started
104
192.168.2.7, 443, 49699, 49700
unknown
unknown
25->104
106
239.255.255.250
unknown
Reserved
25->106
43
chrome.exe
25->43
started
80
C:\Users\user\AppData\...\WindosCPUsystem.exe, PE32+
28->80
dropped
82
C:\Users\user\AppData\...\WindosCPUsystem.vbs, ASCII
28->82
dropped
150
Multi AV Scanner detection
for dropped file
28->150
152
Machine Learning detection
for dropped file
28->152
154
Drops VBS files to the
startup folder
28->154
162
6 other signatures
28->162
46
aspnet_compiler.exe
28->46
started
48
powershell.exe
28->48
started
156
Antivirus detection
for dropped file
31->156
158
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
31->158
160
Tries to evade debugger
and weak emulator (self
modifying code)
31->160
164
3 other signatures
31->164
file10
signatures11
process12
dnsIp13
60
C:\Users\user\AppData\Local\...\skotes.exe, PE32
35->60
dropped
132
Detected unpacking (changes
PE section rights)
35->132
134
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
35->134
136
Tries to evade debugger
and weak emulator (self
modifying code)
35->136
146
4 other signatures
35->146
50
skotes.exe
35->50
started
108
www.google.com
142.250.181.132, 443, 49709, 49710
GOOGLEUS
United States
43->108
110
plus.l.google.com
142.250.201.46, 443, 49743
GOOGLEUS
United States
43->110
112
2 other IPs or domains
43->112
62
C:\Users\user\AppData\...\orupcopicsyv.sys, PE32+
46->62
dropped
138
Injects code into the
Windows Explorer (explorer.exe)
46->138
140
Modifies the context
of a thread in another
process (thread injection)
46->140
142
Sample is not signed
and drops a device driver
46->142
53
explorer.exe
46->53
started
144
Loading BitLocker PowerShell
Module
48->144
56
conhost.exe
48->56
started
58
WmiPrvSE.exe
48->58
started
file14
signatures15
process16
dnsIp17
114
Hides threads from debuggers
50->114
116
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
50->116
118
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
50->118
90
woo097878781.win
154.216.20.243
SKHT-ASShenzhenKatherineHengTechnologyInformationCo
Seychelles
53->90
92
pool.hashvault.pro
5.188.137.200
SELECTEL-MSKRU
Russian Federation
53->92
120
System process connects
to network (likely due
to code injection or
exploit)
53->120
122
Query firmware table
information (likely
to detect VMs)
53->122
signatures18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.