Threat name:
LummaC, Amadey, LummaC Stealer, RHADAMAN
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to start a terminal service
Detected unpacking (changes PE section rights)
Drops VBS files to the startup folder
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Leaks process information
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Potentially malicious time measurement code found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected RHADAMANTHYS Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1577081
Sample:
file.exe
Startdate:
18/12/2024
Architecture:
WINDOWS
Score:
100
120
jlgenfekjlfnvtgpegkwr.xyz
2->120
122
sweepyribs.lat
2->122
124
2 other IPs or domains
2->124
142
Suricata IDS alerts
for network traffic
2->142
144
Found malware configuration
2->144
146
Antivirus detection
for URL or domain
2->146
150
21 other signatures
2->150
11
skotes.exe
34
2->11
started
16
file.exe
5
2->16
started
18
wscript.exe
2->18
started
20
Gxtuum.exe
2->20
started
signatures3
148
Performs DNS queries
to domains with low
reputation
120->148
process4
dnsIp5
132
185.215.113.43, 49747, 49754, 49776
WHOLESALECONNECTIONSNL
Portugal
11->132
134
194.126.174.112, 49760, 80
HVC-ASUS
Netherlands
11->134
136
31.41.244.11, 49782, 49800, 49836
AEROEXPRESS-ASRU
Russian Federation
11->136
104
C:\Users\user\AppData\...\e32937f31a.exe, PE32
11->104
dropped
106
C:\Users\user\AppData\...\01e9c47e49.exe, PE32
11->106
dropped
108
C:\Users\user\AppData\...\ded5179c0a.exe, PE32
11->108
dropped
114
10 other malicious files
11->114
dropped
208
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
11->208
210
Hides threads from debuggers
11->210
212
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->212
214
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->214
22
bluemail.exe
4
11->22
started
26
dad8a16cc2.exe
11->26
started
28
b662acc576.exe
11->28
started
37
3 other processes
11->37
110
C:\Users\user\AppData\Local\...\skotes.exe, PE32
16->110
dropped
112
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
16->112
dropped
216
Detected unpacking (changes
PE section rights)
16->216
218
Tries to evade debugger
and weak emulator (self
modifying code)
16->218
220
Tries to detect virtualization
through RDTSC time measurements
16->220
31
skotes.exe
16->31
started
222
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
18->222
33
vminfo.exe
18->33
started
224
Contains functionality
to start a terminal
service
20->224
35
Gxtuum.exe
20->35
started
file6
signatures7
process8
dnsIp9
90
C:\Users\user\AppData\Local\Temp\vminfo.exe, PE32
22->90
dropped
92
C:\Users\user\AppData\Roaming\...\vminfo.vbs, ASCII
22->92
dropped
152
Contains functionality
to start a terminal
service
22->152
154
Machine Learning detection
for dropped file
22->154
156
Found many strings related
to Crypto-Wallets (likely
being stolen)
22->156
158
Drops VBS files to the
startup folder
22->158
39
bluemail.exe
22->39
started
160
Detected unpacking (changes
PE section rights)
26->160
162
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
26->162
172
3 other signatures
26->172
43
svchost.exe
26->43
started
45
WerFault.exe
26->45
started
138
home.twentytk20pn.top
81.29.149.45, 49847, 49857, 80
COMUNICA_IT_SERVICESCH
Switzerland
28->138
140
httpbin.org
34.226.108.155, 443, 49831
AMAZON-AESUS
United States
28->140
174
3 other signatures
28->174
164
Antivirus detection
for dropped file
31->164
166
Multi AV Scanner detection
for dropped file
31->166
168
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
31->168
170
Potentially malicious
time measurement code
found
31->170
47
vminfo.exe
33->47
started
94
C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32+
37->94
dropped
96
C:\Users\user\AppData\Local\Temp\...\7z.dll, PE32+
37->96
dropped
176
3 other signatures
37->176
49
cmd.exe
37->49
started
51
ded5179c0a.exe
37->51
started
54
d24d271099.exe
37->54
started
56
2 other processes
37->56
file10
signatures11
process12
dnsIp13
98
C:\Users\user\AppData\Local\...behaviorgraphxtuum.exe, PE32
39->98
dropped
178
Contains functionality
to start a terminal
service
39->178
58
Gxtuum.exe
39->58
started
180
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
43->180
182
Checks if the current
machine is a virtual
machine (disk enumeration)
43->182
184
Switches to a custom
stack to bypass stack
traces
43->184
186
Uses cmd line tools
excessively to alter
registry or file data
49->186
61
in.exe
49->61
started
64
7z.exe
49->64
started
66
conhost.exe
49->66
started
68
9 other processes
49->68
126
sweepyribs.lat
104.21.2.110, 443, 49881
CLOUDFLARENETUS
United States
51->126
188
Query firmware table
information (likely
to detect VMs)
51->188
190
Tries to harvest and
steal ftp login credentials
51->190
192
Tries to harvest and
steal browser information
(history, passwords,
etc)
51->192
128
pancakedipyps.click
104.21.23.76, 443, 49799, 49806
CLOUDFLARENETUS
United States
54->128
194
Found many strings related
to Crypto-Wallets (likely
being stolen)
54->194
196
Tries to steal Crypto
Currency Wallets
54->196
file14
signatures15
process16
file17
198
Contains functionality
to start a terminal
service
58->198
200
Machine Learning detection
for dropped file
58->200
70
Gxtuum.exe
58->70
started
116
C:\Users\...\Intel_PTT_EK_Recertification.exe, PE32+
61->116
dropped
202
Suspicious powershell
command line found
61->202
204
Uses cmd line tools
excessively to alter
registry or file data
61->204
206
Uses schtasks.exe or
at.exe to add and modify
task schedules
61->206
74
attrib.exe
61->74
started
76
attrib.exe
61->76
started
78
schtasks.exe
61->78
started
80
powershell.exe
61->80
started
118
C:\Users\user\AppData\Local\Temp\...\in.exe, PE32+
64->118
dropped
signatures18
process19
dnsIp20
130
cobolrationumelawrtewarms.com
89.35.131.209
INTERSAT-ASIonRatiunr33RO
Romania
70->130
100
C:\Users\user\AppData\Local\...\bluemail.exe, PE32
70->100
dropped
102
C:\Users\user\AppData\...\bluemail[1].exe, PE32
70->102
dropped
82
conhost.exe
74->82
started
84
conhost.exe
76->84
started
86
conhost.exe
78->86
started
88
conhost.exe
80->88
started
file21
process22
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.