Threat name:
NetSupport RAT, LummaC, Amadey, Blank Gr
Alert
Classification:
rans.troj.adwa.spyw.expl.evad
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Encrypted powershell cmdline option found
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Removes signatures from Windows Defender
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rar Usage with Password and Compression Level
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Writes or reads registry keys via WMI
Yara detected Amadeys stealer DLL
Yara detected Blank Grabber
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected Telegram RAT
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1578555
Sample:
file.exe
Startdate:
19/12/2024
Architecture:
WINDOWS
Score:
100
142
Found malware configuration
2->142
144
Antivirus detection
for dropped file
2->144
146
Antivirus / Scanner
detection for submitted
sample
2->146
148
25 other signatures
2->148
12
file.exe
5
2->12
started
16
skotes.exe
2->16
started
18
skotes.exe
2->18
started
process3
file4
116
C:\Users\user\AppData\Local\...\skotes.exe, PE32
12->116
dropped
118
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
12->118
dropped
208
Detected unpacking (changes
PE section rights)
12->208
210
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
12->210
212
Tries to evade debugger
and weak emulator (self
modifying code)
12->212
214
Tries to detect virtualization
through RDTSC time measurements
12->214
20
skotes.exe
4
89
12->20
started
216
Hides threads from debuggers
16->216
218
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
16->218
220
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
16->220
signatures5
process6
dnsIp7
120
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
20->120
122
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
20->122
124
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
20->124
92
C:\Users\user\AppData\...\85070a414c.exe, PE32
20->92
dropped
94
C:\Users\user\AppData\...\194df6b68b.exe, PE32
20->94
dropped
96
C:\Users\user\AppData\...\b8dc7af2d8.exe, PE32
20->96
dropped
98
43 other malicious files
20->98
dropped
178
Uses cmd line tools
excessively to alter
registry or file data
20->178
180
Creates multiple autostart
registry keys
20->180
182
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
20->182
184
3 other signatures
20->184
25
D1UL0FG.exe
22
20->25
started
29
d188864e84.exe
20->29
started
32
m9sfEU9.exe
20->32
started
34
2 other processes
20->34
file8
signatures9
process10
dnsIp11
100
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
25->100
dropped
102
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
25->102
dropped
104
C:\Users\user\AppData\Local\...\select.pyd, PE32+
25->104
dropped
112
16 other files (15 malicious)
25->112
dropped
186
Antivirus detection
for dropped file
25->186
188
Modifies Windows Defender
protection settings
25->188
190
Adds a directory exclusion
to Windows Defender
25->190
204
2 other signatures
25->204
36
D1UL0FG.exe
1
108
25->36
started
140
172.67.180.113
CLOUDFLARENETUS
United States
29->140
192
Multi AV Scanner detection
for dropped file
29->192
194
Detected unpacking (changes
PE section rights)
29->194
196
Query firmware table
information (likely
to detect VMs)
29->196
206
8 other signatures
29->206
106
C:\Users\Public106etstat\remcmdstub.exe, PE32
32->106
dropped
108
C:\Users\Public108etstat\pcicapi.dll, PE32
32->108
dropped
110
C:\Users\Public110etstat\TCCTL32.DLL, PE32
32->110
dropped
114
5 other files (4 malicious)
32->114
dropped
40
FuturreApp.exe
32->40
started
42
Conhost.exe
32->42
started
198
Uses cmd line tools
excessively to alter
registry or file data
34->198
200
Injects a PE file into
a foreign processes
34->200
202
LummaC encrypted strings
found
34->202
44
8ZVMneG.exe
34->44
started
46
d0ef52de9f.exe
34->46
started
48
conhost.exe
34->48
started
50
2 other processes
34->50
file12
signatures13
process14
dnsIp15
126
208.95.112.1
TUT-ASUS
United States
36->126
128
149.154.167.220
TELEGRAMRU
United Kingdom
36->128
130
172.217.19.227
GOOGLEUS
United States
36->130
164
Found many strings related
to Crypto-Wallets (likely
being stolen)
36->164
166
Tries to harvest and
steal browser information
(history, passwords,
etc)
36->166
168
Modifies Windows Defender
protection settings
36->168
176
5 other signatures
36->176
52
cmd.exe
36->52
started
55
cmd.exe
36->55
started
57
cmd.exe
36->57
started
59
24 other processes
36->59
132
185.215.113.64
WHOLESALECONNECTIONSNL
Portugal
40->132
134
172.67.68.212
CLOUDFLARENETUS
United States
40->134
170
Multi AV Scanner detection
for dropped file
40->170
138
4 other IPs or domains
44->138
172
Query firmware table
information (likely
to detect VMs)
44->172
174
Tries to steal Crypto
Currency Wallets
44->174
136
104.21.23.76
CLOUDFLARENETUS
United States
46->136
signatures16
process17
signatures18
150
Suspicious powershell
command line found
52->150
152
Uses cmd line tools
excessively to alter
registry or file data
52->152
154
Encrypted powershell
cmdline option found
52->154
162
4 other signatures
52->162
61
powershell.exe
52->61
started
64
conhost.exe
52->64
started
156
Modifies Windows Defender
protection settings
55->156
158
Adds a directory exclusion
to Windows Defender
55->158
66
powershell.exe
55->66
started
77
2 other processes
55->77
68
powershell.exe
57->68
started
71
conhost.exe
57->71
started
160
Tries to harvest and
steal WLAN passwords
59->160
73
getmac.exe
59->73
started
75
powershell.exe
59->75
started
79
46 other processes
59->79
process19
file20
222
Loading BitLocker PowerShell
Module
61->222
88
C:\Users\user\AppData\...\l2sopuet.cmdline, Unicode
68->88
dropped
81
csc.exe
68->81
started
224
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
73->224
226
Writes or reads registry
keys via WMI
73->226
90
C:\Users\user\AppData\Local\Temp\vLqBW.zip, RAR
79->90
dropped
signatures21
process22
file23
86
C:\Users\user\AppData\Local\...\l2sopuet.dll, PE32
81->86
dropped
84
cvtres.exe
81->84
started
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.