Threat name:
LummaC, Amadey, Babadeda, LiteHTTP Bot,
Alert
Classification:
phis.troj.spyw.expl.evad
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Drops PE files to the document folder of the user
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell download and execute file
Sigma detected: PowerShell DownloadFile
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: Suspicious MSHTA Child Process
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected LiteHTTP Bot
Yara detected LummaC Stealer
Yara detected obfuscated html page
Yara detected Poverty Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1582701
Sample:
5EfYBe3nch.exe
Startdate:
31/12/2024
Architecture:
WINDOWS
Score:
100
174
Found malware configuration
2->174
176
Malicious sample detected
(through community Yara
rule)
2->176
178
Antivirus detection
for URL or domain
2->178
180
30 other signatures
2->180
10
5EfYBe3nch.exe
2
2->10
started
15
skotes.exe
2->15
started
17
cmd.exe
2->17
started
19
3 other processes
2->19
process3
dnsIp4
158
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
10->158
160
104.21.96.1
CLOUDFLARENETUS
United States
10->160
128
C:\Users\user\...\DLTDCR8UJINP8YM8Y.exe, PE32
10->128
dropped
130
C:\Users\...\31FYMQUCQX14ZVCZU2HAYNV7V.exe, PE32
10->130
dropped
246
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
10->246
248
Query firmware table
information (likely
to detect VMs)
10->248
250
Found many strings related
to Crypto-Wallets (likely
being stolen)
10->250
260
4 other signatures
10->260
21
DLTDCR8UJINP8YM8Y.exe
36
10->21
started
26
31FYMQUCQX14ZVCZU2HAYNV7V.exe
4
10->26
started
162
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
15->162
164
104.18.10.31
CLOUDFLARENETUS
United States
15->164
166
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
15->166
132
C:\Users\user\AppData\...\36ac23ea9d.exe, PE32
15->132
dropped
134
C:\Users\user\AppData\Local\...\av3EZhq.exe, PE32+
15->134
dropped
136
C:\Users\user\AppData\Local\Temp\...\am.exe, PE32
15->136
dropped
140
12 other malicious files
15->140
dropped
252
Hides threads from debuggers
15->252
254
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
15->254
256
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
15->256
28
eXbhgU9.exe
15->28
started
30
cmd.exe
15->30
started
32
iSHmPkn.exe
15->32
started
138
C:\Temp\random.hta, HTML
17->138
dropped
258
Creates HTA files
17->258
38
2 other processes
17->38
34
cmd.exe
19->34
started
36
cmd.exe
19->36
started
40
2 other processes
19->40
file5
signatures6
process7
dnsIp8
148
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
21->148
150
127.0.0.1
unknown
unknown
21->150
110
C:\Users\user\DocumentsbehaviorgraphIIIIJDHJE.exe, PE32
21->110
dropped
112
C:\Users\user\AppData\...\softokn3[1].dll, PE32
21->112
dropped
114
C:\Users\user\AppData\Local\...\random[1].exe, PE32
21->114
dropped
124
11 other files (7 malicious)
21->124
dropped
196
Detected unpacking (changes
PE section rights)
21->196
198
Attempt to bypass Chrome
Application-Bound Encryption
21->198
200
Drops PE files to the
document folder of the
user
21->200
216
7 other signatures
21->216
42
cmd.exe
1
21->42
started
45
chrome.exe
21->45
started
116
C:\Users\user\AppData\Local\...\skotes.exe, PE32
26->116
dropped
202
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
26->202
218
2 other signatures
26->218
48
skotes.exe
26->48
started
152
140.82.121.3
GITHUBUS
United States
28->152
154
185.199.109.133
FASTLYUS
Netherlands
28->154
118
C:\YQNZByFp\jyidkjkfhjawd.exe, PE32
28->118
dropped
204
Multi AV Scanner detection
for dropped file
28->204
206
Machine Learning detection
for dropped file
28->206
208
Adds a directory exclusion
to Windows Defender
28->208
57
4 other processes
28->57
50
cmd.exe
30->50
started
53
conhost.exe
30->53
started
156
185.244.212.106
M247GB
Romania
32->156
210
Antivirus detection
for dropped file
32->210
220
2 other signatures
32->220
120
C:\Temp\8tA3oGhlP.txt, HTML
34->120
dropped
59
6 other processes
34->59
122
C:\Temp122LqFjPikt.txt, HTML
36->122
dropped
61
6 other processes
36->61
212
Suspicious powershell
command line found
38->212
214
Tries to download and
execute files (via powershell)
38->214
55
powershell.exe
38->55
started
file9
signatures10
process11
dnsIp12
222
Uses schtasks.exe or
at.exe to add and modify
task schedules
42->222
63
GIIIIJDHJE.exe
2
42->63
started
66
conhost.exe
42->66
started
168
192.168.2.4
unknown
unknown
45->168
170
239.255.255.250
unknown
Reserved
45->170
224
Suspicious execution
chain found
45->224
68
chrome.exe
45->68
started
226
Detected unpacking (changes
PE section rights)
48->226
228
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
48->228
230
Tries to evade debugger
and weak emulator (self
modifying code)
48->230
242
3 other signatures
48->242
106
C:\Temp\QZ7iCUD92.txt, HTML
50->106
dropped
108
C:\Temp\.gif, HTML
50->108
dropped
71
mshta.exe
50->71
started
73
5 other processes
50->73
75
2 other processes
55->75
172
172.67.179.160
CLOUDFLARENETUS
United States
57->172
232
Multi AV Scanner detection
for dropped file
57->232
234
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
57->234
236
Query firmware table
information (likely
to detect VMs)
57->236
244
5 other signatures
57->244
77
2 other processes
57->77
79
3 other processes
59->79
238
Suspicious powershell
command line found
61->238
240
Tries to download and
execute files (via powershell)
61->240
81
3 other processes
61->81
file13
signatures14
process15
dnsIp16
262
Detected unpacking (changes
PE section rights)
63->262
264
Tries to evade debugger
and weak emulator (self
modifying code)
63->264
266
Hides threads from debuggers
63->266
83
skotes.exe
63->83
started
142
142.250.184.206
GOOGLEUS
United States
68->142
144
142.250.185.195
GOOGLEUS
United States
68->144
146
8 other IPs or domains
68->146
268
Suspicious powershell
command line found
71->268
270
Tries to download and
execute files (via powershell)
71->270
86
powershell.exe
71->86
started
89
powershell.exe
73->89
started
91
powershell.exe
73->91
started
272
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
75->272
274
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
75->274
93
483d2fa8a0d53818306efeb32d3.exe
79->93
started
95
conhost.exe
79->95
started
97
483d2fa8a0d53818306efeb32d3.exe
81->97
started
99
conhost.exe
81->99
started
signatures17
process18
file19
182
Hides threads from debuggers
83->182
184
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
83->184
186
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
83->186
126
C:\Users\...\483d2fa8a0d53818306efeb32d3.exe, PE32
86->126
dropped
101
483d2fa8a0d53818306efeb32d3.exe
86->101
started
104
conhost.exe
86->104
started
signatures20
process21
signatures22
188
Detected unpacking (changes
PE section rights)
101->188
190
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
101->190
192
Tries to evade debugger
and weak emulator (self
modifying code)
101->192
194
3 other signatures
101->194
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.