Threat name:
Amadey, Fabookie, Glupteba, LummaC Steal
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1381767
Sample:
n2vzgCmJ7K.exe
Startdate:
26/01/2024
Architecture:
WINDOWS
Score:
100
138
transfer.sh
2->138
140
transfer.adttemp.com.br
2->140
142
10 other IPs or domains
2->142
190
Snort IDS alert for
network traffic
2->190
192
Multi AV Scanner detection
for domain / URL
2->192
194
Found malware configuration
2->194
196
22 other signatures
2->196
12
n2vzgCmJ7K.exe
1
5
2->12
started
16
svchost.exe
2->16
started
18
explorhe.exe
2->18
started
20
explorhe.exe
2->20
started
signatures3
process4
file5
108
C:\Users\user\AppData\Local\...\explorhe.exe, PE32
12->108
dropped
224
Detected unpacking (changes
PE section rights)
12->224
226
Hides threads from debuggers
12->226
228
Contains functionality
to detect sleep reduction
/ modifications
12->228
22
explorhe.exe
50
12->22
started
27
WerFault.exe
16->27
started
29
WerFault.exe
16->29
started
31
WerFault.exe
16->31
started
33
6 other processes
16->33
signatures6
process7
dnsIp8
144
185.215.113.68, 49729, 49730, 49732
WHOLESALECONNECTIONSNL
Portugal
22->144
146
109.107.182.3, 49731, 80
TELEPORT-TV-ASRU
Russian Federation
22->146
148
185.172.128.19, 49734, 80
NADYMSS-ASRU
Russian Federation
22->148
100
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
22->100
dropped
102
C:\Users\user\AppData\Local\Temp\...\moto.exe, PE32+
22->102
dropped
104
C:\Users\user\AppData\Local\Temp\...\alex.exe, PE32
22->104
dropped
106
21 other malicious files
22->106
dropped
216
Multi AV Scanner detection
for dropped file
22->216
218
Detected unpacking (changes
PE section rights)
22->218
220
Creates an undocumented
autostart registry key
22->220
222
5 other signatures
22->222
35
latestrocki.exe
22->35
started
39
leg221.exe
4
22->39
started
42
2024.exe
22->42
started
44
4 other processes
22->44
file9
signatures10
process11
dnsIp12
92
C:\Users\user\AppData\Local\...\toolspub1.exe, PE32
35->92
dropped
94
C:\Users\user\AppData\Local\Temp\rty25.exe, PE32+
35->94
dropped
96
C:\Users\user\AppData\...\InstallSetup7.exe, PE32
35->96
dropped
98
2 other malicious files
35->98
dropped
198
Multi AV Scanner detection
for dropped file
35->198
46
InstallSetup7.exe
35->46
started
51
toolspub1.exe
35->51
started
53
31839b57a4f11171d6abc8bbc4451ee4.exe
35->53
started
59
3 other processes
35->59
150
80.79.4.61
SISTEMEMD
Moldova Republic of
39->150
200
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->200
202
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
39->202
204
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
39->204
152
195.20.16.103
EITADAT-ASFI
Finland
42->152
206
Tries to harvest and
steal browser information
(history, passwords,
etc)
42->206
154
braidfadefriendklypk.site
104.21.1.205
CLOUDFLARENETUS
United States
44->154
156
consciouosoepewmausj.site
104.21.71.8
CLOUDFLARENETUS
United States
44->156
208
System process connects
to network (likely due
to code injection or
exploit)
44->208
210
Query firmware table
information (likely
to detect VMs)
44->210
212
Writes to foreign memory
regions
44->212
214
3 other signatures
44->214
55
conhost.exe
44->55
started
57
conhost.exe
44->57
started
file13
signatures14
process15
dnsIp16
166
185.172.128.90
NADYMSS-ASRU
Russian Federation
46->166
168
5.42.64.33
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
46->168
126
C:\Users\user\AppData\Local\...\INetC.dll, PE32
46->126
dropped
128
C:\Users\user\AppData\Local\...\nsiF8C6.tmp, PE32
46->128
dropped
130
C:\Users\user\AppData\...\BroomSetup.exe, PE32
46->130
dropped
132
C:\Users\user\AppData\...\syncUpd[1].exe, PE32
46->132
dropped
172
Multi AV Scanner detection
for dropped file
46->172
61
nsiF8C6.tmp
46->61
started
66
BroomSetup.exe
46->66
started
174
Detected unpacking (changes
PE section rights)
51->174
176
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
51->176
178
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
51->178
188
3 other signatures
51->188
68
explorer.exe
51->68
injected
180
Detected unpacking (overwrites
its own PE header)
53->180
182
Found Tor onion address
53->182
70
WerFault.exe
53->70
started
72
WerFault.exe
53->72
started
74
WerFault.exe
53->74
started
78
5 other processes
53->78
170
i.alie3ksgaa.com
154.92.15.189
HKKFGL-AS-APHKKwaifongGroupLimitedHK
Seychelles
59->170
134
C:\ProgramData\...\reakuqnanrkn.exe, PE32+
59->134
dropped
136
C:\Users\...\7a246486dc14b3a22f66d07b9f7064d6, SQLite
59->136
dropped
184
Tries to harvest and
steal browser information
(history, passwords,
etc)
59->184
186
Adds a directory exclusion
to Windows Defender
59->186
76
powershell.exe
59->76
started
file17
signatures18
process19
dnsIp20
158
185.172.128.79
NADYMSS-ASRU
Russian Federation
61->158
110
C:\Users\user\AppData\...\softokn3[1].dll, PE32
61->110
dropped
112
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
61->112
dropped
114
C:\Users\user\AppData\...\mozglue[1].dll, PE32
61->114
dropped
122
9 other files (5 malicious)
61->122
dropped
230
Detected unpacking (changes
PE section rights)
61->230
232
Detected unpacking (overwrites
its own PE header)
61->232
234
Tries to steal Mail
credentials (via file
/ registry access)
61->234
244
3 other signatures
61->244
236
Multi AV Scanner detection
for dropped file
66->236
80
cmd.exe
66->80
started
160
45.15.156.13
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
68->160
162
146.0.41.68
MYLOC-ASIPBackboneofmyLocmanagedITAGDE
Germany
68->162
164
7 other IPs or domains
68->164
116
C:\Users\user\AppData\Roaming\svhehih, PE32
68->116
dropped
118
C:\Users\user\AppData\Local\Temp\F64E.exe, PE32
68->118
dropped
120
C:\Users\user\AppData\Local\Temp\D8A0.exe, PE32+
68->120
dropped
124
4 other malicious files
68->124
dropped
238
System process connects
to network (likely due
to code injection or
exploit)
68->238
240
Benign windows process
drops PE files
68->240
242
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
68->242
82
conhost.exe
76->82
started
file21
signatures22
process23
process24
84
conhost.exe
80->84
started
86
chcp.com
80->86
started
88
schtasks.exe
80->88
started
90
Conhost.exe
80->90
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.