Threat name:
Amadey, LummaC Stealer, Stealc, Vidar
Alert
Classification:
troj.spyw.evad
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1552543
Sample:
file.exe
Startdate:
09/11/2024
Architecture:
WINDOWS
Score:
100
91
thumbystriw.store
2->91
93
presticitpo.store
2->93
95
5 other IPs or domains
2->95
119
Suricata IDS alerts
for network traffic
2->119
121
Found malware configuration
2->121
123
Antivirus detection
for URL or domain
2->123
125
19 other signatures
2->125
9
skotes.exe
3
25
2->9
started
14
file.exe
37
2->14
started
16
skotes.exe
2->16
started
18
6 other processes
2->18
signatures3
process4
dnsIp5
97
185.215.113.43, 49805, 49821, 80
WHOLESALECONNECTIONSNL
Portugal
9->97
99
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
9->99
73
C:\Users\user\AppData\...\43db7973fb.exe, PE32
9->73
dropped
75
C:\Users\user\AppData\...\3224179edf.exe, PE32
9->75
dropped
77
C:\Users\user\AppData\...\5b1e747ba0.exe, PE32
9->77
dropped
85
5 other malicious files
9->85
dropped
163
Creates multiple autostart
registry keys
9->163
185
3 other signatures
9->185
20
chrone.exe
1
2
9->20
started
24
43db7973fb.exe
9->24
started
26
5b1e747ba0.exe
9->26
started
33
2 other processes
9->33
101
185.215.113.16, 49762, 80
WHOLESALECONNECTIONSNL
Portugal
14->101
103
185.215.113.206, 49730, 49754, 80
WHOLESALECONNECTIONSNL
Portugal
14->103
79
C:\Users\user\DocumentsDAEHJJECAE.exe, PE32
14->79
dropped
81
C:\Users\user\AppData\...\softokn3[1].dll, PE32
14->81
dropped
83
C:\Users\user\AppData\Local\...\random[1].exe, PE32
14->83
dropped
87
12 other files (8 malicious)
14->87
dropped
165
Detected unpacking (changes
PE section rights)
14->165
167
Attempt to bypass Chrome
Application-Bound Encryption
14->167
169
Drops PE files to the
document folder of the
user
14->169
187
9 other signatures
14->187
29
cmd.exe
1
14->29
started
31
chrome.exe
14->31
started
171
Antivirus detection
for dropped file
16->171
173
Machine Learning detection
for dropped file
16->173
175
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
16->175
105
127.0.0.1
unknown
unknown
18->105
177
Multi AV Scanner detection
for dropped file
18->177
179
Query firmware table
information (likely
to detect VMs)
18->179
181
Tries to harvest and
steal ftp login credentials
18->181
183
Found direct / indirect
Syscall (likely to bypass
EDR)
18->183
file6
signatures7
process8
dnsIp9
71
C:\ProgramData\...\rfopgxavqojn.exe, PE32+
20->71
dropped
137
Multi AV Scanner detection
for dropped file
20->137
139
Detected unpacking (changes
PE section rights)
20->139
141
Uses powercfg.exe to
modify the power settings
20->141
155
4 other signatures
20->155
35
powershell.exe
20->35
started
38
cmd.exe
20->38
started
40
sc.exe
20->40
started
50
12 other processes
20->50
143
Machine Learning detection
for dropped file
24->143
145
Modifies windows update
settings
24->145
147
Disables Windows Defender
Tamper protection
24->147
157
2 other signatures
24->157
107
navygenerayk.store
188.114.96.3
CLOUDFLARENETUS
European Union
26->107
149
Antivirus detection
for dropped file
26->149
151
Query firmware table
information (likely
to detect VMs)
26->151
159
2 other signatures
26->159
42
DocumentsDAEHJJECAE.exe
4
29->42
started
45
conhost.exe
29->45
started
109
192.168.2.4, 443, 49723, 49724
unknown
unknown
31->109
111
239.255.255.250
unknown
Reserved
31->111
47
chrome.exe
31->47
started
153
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
33->153
161
2 other signatures
33->161
file10
signatures11
process12
dnsIp13
127
Loading BitLocker PowerShell
Module
35->127
52
conhost.exe
35->52
started
54
WmiPrvSE.exe
35->54
started
56
conhost.exe
38->56
started
58
wusa.exe
38->58
started
60
conhost.exe
40->60
started
89
C:\Users\user\AppData\Local\...\skotes.exe, PE32
42->89
dropped
129
Antivirus detection
for dropped file
42->129
131
Detected unpacking (changes
PE section rights)
42->131
133
Machine Learning detection
for dropped file
42->133
135
6 other signatures
42->135
62
skotes.exe
42->62
started
113
www.google.com
142.250.186.164, 443, 49736, 49737
GOOGLEUS
United States
47->113
115
plus.l.google.com
172.217.16.142, 443, 49746
GOOGLEUS
United States
47->115
117
2 other IPs or domains
47->117
65
conhost.exe
50->65
started
67
conhost.exe
50->67
started
69
10 other processes
50->69
file14
signatures15
process16
signatures17
189
Hides threads from debuggers
62->189
191
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
62->191
193
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
62->193
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.