Threat name:
Amadey, LummaC Stealer, Stealc, Vidar, X
Alert
Classification:
troj.spyw.expl.evad.mine
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Downloads files with wrong headers with respect to MIME Content-Type
Drops password protected ZIP file
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Mail credentials (via file / registry access)
Uses cmd line tools excessively to alter registry or file data
Uses ipconfig to lookup or modify the Windows network settings
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1575186
Sample:
file.exe
Startdate:
14/12/2024
Architecture:
WINDOWS
Score:
100
141
effecterectz.xyz
2->141
143
diffuculttan.xyz
2->143
145
56 other IPs or domains
2->145
175
Suricata IDS alerts
for network traffic
2->175
177
Found malware configuration
2->177
179
Malicious sample detected
(through community Yara
rule)
2->179
183
32 other signatures
2->183
11
skotes.exe
2
36
2->11
started
16
file.exe
5
2->16
started
18
cmd.exe
2->18
started
20
2 other processes
2->20
signatures3
181
Performs DNS queries
to domains with low
reputation
143->181
process4
dnsIp5
161
185.215.113.43, 49813, 49819, 49833
WHOLESALECONNECTIONSNL
Portugal
11->161
163
185.215.113.16, 49908, 49935, 80
WHOLESALECONNECTIONSNL
Portugal
11->163
165
2 other IPs or domains
11->165
127
C:\Users\user\AppData\...\e0d9092049.exe, PE32
11->127
dropped
129
C:\Users\user\AppData\...\32b3bd221f.exe, PE32
11->129
dropped
131
C:\Users\user\AppData\...\7c2740584e.exe, PE32
11->131
dropped
137
11 other malicious files
11->137
dropped
229
Creates multiple autostart
registry keys
11->229
231
Hides threads from debuggers
11->231
233
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->233
235
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->235
22
powershell.exe
15
17
11->22
started
26
d70c424e9a.exe
8
11->26
started
29
7c2740584e.exe
11->29
started
39
2 other processes
11->39
133
C:\Users\user\AppData\Local\...\skotes.exe, PE32
16->133
dropped
135
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
16->135
dropped
237
Detected unpacking (changes
PE section rights)
16->237
239
Tries to evade debugger
and weak emulator (self
modifying code)
16->239
241
Tries to detect virtualization
through RDTSC time measurements
16->241
31
skotes.exe
16->31
started
33
wscript.exe
18->33
started
35
conhost.exe
18->35
started
243
Multi AV Scanner detection
for dropped file
20->243
245
Suspicious powershell
command line found
20->245
247
Injects code into the
Windows Explorer (explorer.exe)
20->247
249
Modifies the context
of a thread in another
process (thread injection)
20->249
37
explorer.exe
20->37
started
41
2 other processes
20->41
file6
signatures7
process8
dnsIp9
147
185.11.61.104, 49831, 49844, 49854
VERTEX-ASRU
Russian Federation
22->147
195
Contains functionality
to start a terminal
service
22->195
211
5 other signatures
22->211
43
RegSvcs.exe
19
22->43
started
47
conhost.exe
22->47
started
49
ipconfig.exe
1
22->49
started
123
C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32+
26->123
dropped
125
C:\Users\user\AppData\Local\Temp\...\7z.dll, PE32+
26->125
dropped
197
Multi AV Scanner detection
for dropped file
26->197
51
cmd.exe
2
26->51
started
149
deafeninggeh.biz
104.21.16.1
CLOUDFLARENETUS
United States
29->149
151
tacitglibbr.biz
104.21.50.161, 443, 49933
CLOUDFLARENETUS
United States
29->151
153
immureprech.biz
172.67.207.38
CLOUDFLARENETUS
United States
29->153
213
3 other signatures
29->213
199
Antivirus detection
for dropped file
31->199
201
Detected unpacking (changes
PE section rights)
31->201
215
4 other signatures
31->215
203
Suspicious powershell
command line found
33->203
205
Wscript starts Powershell
(via cmd or directly)
33->205
217
2 other signatures
33->217
53
powershell.exe
33->53
started
207
Found strings related
to Crypto-Mining
37->207
155
t.me
149.154.167.99, 443, 49900
TELEGRAMRU
United Kingdom
39->155
157
zonedw.sbs
116.203.10.31, 443, 49909, 49918
HETZNER-ASDE
Germany
39->157
209
Detected unpacking (overwrites
its own PE header)
39->209
219
2 other signatures
39->219
55
31d3c17d85.exe
39->55
started
57
conhost.exe
39->57
started
59
PING.EXE
41->59
started
61
conhost.exe
41->61
started
file10
signatures11
process12
dnsIp13
167
176.113.115.178, 49860, 49880, 49916
SELECTELRU
Russian Federation
43->167
221
Contains functionality
to start a terminal
service
43->221
223
Contains functionality
to inject code into
remote processes
43->223
63
powershell.exe
17
43->63
started
66
powershell.exe
43->66
started
225
Uses cmd line tools
excessively to alter
registry or file data
51->225
68
in.exe
51->68
started
71
7z.exe
51->71
started
73
conhost.exe
51->73
started
79
9 other processes
51->79
227
Adds a directory exclusion
to Windows Defender
53->227
75
powershell.exe
53->75
started
77
conhost.exe
53->77
started
169
drive-connect.cyou
172.67.139.78, 443, 49893
CLOUDFLARENETUS
United States
55->169
171
steamcommunity.com
23.55.153.106, 443, 49910
AKAMAI-ASN1EU
United States
55->171
173
127.1.10.1
unknown
unknown
59->173
signatures14
process15
file16
251
Writes to foreign memory
regions
63->251
253
Injects a PE file into
a foreign processes
63->253
81
RegSvcs.exe
63->81
started
86
conhost.exe
63->86
started
88
ipconfig.exe
63->88
started
90
RegSvcs.exe
66->90
started
100
3 other processes
66->100
119
C:\Users\...\Intel_PTT_EK_Recertification.exe, PE32+
68->119
dropped
255
Suspicious powershell
command line found
68->255
257
Uses cmd line tools
excessively to alter
registry or file data
68->257
259
Uses schtasks.exe or
at.exe to add and modify
task schedules
68->259
92
powershell.exe
68->92
started
94
attrib.exe
68->94
started
96
attrib.exe
68->96
started
98
schtasks.exe
68->98
started
121
C:\Users\user\AppData\Local\Temp\...\in.exe, PE32+
71->121
dropped
261
Loading BitLocker PowerShell
Module
75->261
signatures17
process18
dnsIp19
139
176.113.115.177, 49874, 49888, 7702
SELECTELRU
Russian Federation
81->139
115
C:\Users\user\AppData\...\RegSvcs.exe.log, ASCII
81->115
dropped
185
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
81->185
187
Tries to steal Mail
credentials (via file
/ registry access)
81->187
189
Found many strings related
to Crypto-Wallets (likely
being stolen)
81->189
193
3 other signatures
81->193
117
C:\Windows\Temp\pqwzpz5w.inf, Windows
90->117
dropped
102
cmstp.exe
90->102
started
191
Uses ping.exe to check
the status of other
devices and networks
92->191
104
PING.EXE
92->104
started
107
conhost.exe
92->107
started
109
conhost.exe
94->109
started
111
conhost.exe
96->111
started
113
conhost.exe
98->113
started
file20
signatures21
process22
dnsIp23
159
127.0.0.1
unknown
unknown
104->159
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.