Threat name:
Amadey, LummaC Stealer, PureLog Stealer,
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to check for running processes (XOR)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1379228
Sample:
9m1mCFDHqy.exe
Startdate:
23/01/2024
Architecture:
WINDOWS
Score:
100
128
youtube-ui.l.google.com
2->128
130
www.youtube.com
2->130
132
40 other IPs or domains
2->132
150
Snort IDS alert for
network traffic
2->150
152
Multi AV Scanner detection
for domain / URL
2->152
154
Found malware configuration
2->154
156
21 other signatures
2->156
11
9m1mCFDHqy.exe
1
5
2->11
started
15
MPGPH131.exe
2->15
started
17
MPGPH131.exe
2->17
started
19
6 other processes
2->19
signatures3
process4
dnsIp5
102
C:\Users\user\AppData\Local\...\explorhe.exe, PE32
11->102
dropped
184
Detected unpacking (changes
PE section rights)
11->184
186
Contains functionality
to detect sleep reduction
/ modifications
11->186
22
explorhe.exe
1
52
11->22
started
188
Machine Learning detection
for dropped file
15->188
190
Found many strings related
to Crypto-Wallets (likely
being stolen)
15->190
192
Tries to harvest and
steal browser information
(history, passwords,
etc)
15->192
194
Tries to steal Mail
credentials (via file
/ registry access)
17->194
196
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
17->196
198
Hides threads from debuggers
17->198
134
127.0.0.1
unknown
unknown
19->134
104
C:\Users\user\AppData\Local\...\Login Data, SQLite
19->104
dropped
200
Antivirus detection
for dropped file
19->200
202
Multi AV Scanner detection
for dropped file
19->202
204
Tries to evade debugger
and weak emulator (self
modifying code)
19->204
27
powershell.exe
19->27
started
file6
signatures7
process8
dnsIp9
136
185.215.113.68, 49729, 49730, 49731
WHOLESALECONNECTIONSNL
Portugal
22->136
138
109.107.182.3
TELEPORT-TV-ASRU
Russian Federation
22->138
140
185.172.128.19, 49733, 80
NADYMSS-ASRU
Russian Federation
22->140
94
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
22->94
dropped
96
C:\Users\user\AppData\Local\...\leg221.exe, PE32
22->96
dropped
98
C:\Users\user\AppData\Local\...\store.exe, PE32
22->98
dropped
100
22 other malicious files
22->100
dropped
158
Multi AV Scanner detection
for dropped file
22->158
160
Detected unpacking (changes
PE section rights)
22->160
162
Creates an undocumented
autostart registry key
22->162
164
5 other signatures
22->164
29
rback.exe
1
101
22->29
started
34
gold1234.exe
22->34
started
36
rdx1122.exe
22->36
started
40
5 other processes
22->40
38
conhost.exe
27->38
started
file10
signatures11
process12
dnsIp13
142
193.233.132.62, 50500
FREE-NET-ASFREEnetEU
Russian Federation
29->142
144
ipinfo.io
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
29->144
106
C:\Users\user\...\tJSqLg_cUCg9nBhUf13x.exe, PE32
29->106
dropped
108
C:\Users\user\...\iXISsbAzSWLbUgJ5CTTm.exe, PE32
29->108
dropped
110
C:\Users\user\...\c6aCD6LMsOmrpdbER4Hm.exe, PE32
29->110
dropped
116
10 other malicious files
29->116
dropped
206
Detected unpacking (changes
PE section rights)
29->206
208
Contains functionality
to check for running
processes (XOR)
29->208
210
Binary is likely a compiled
AutoIt script file
29->210
228
6 other signatures
29->228
42
Tj9mvtidz1eAgYGQV9rL.exe
29->42
started
45
c6aCD6LMsOmrpdbER4Hm.exe
29->45
started
47
tJSqLg_cUCg9nBhUf13x.exe
29->47
started
58
2 other processes
29->58
212
Multi AV Scanner detection
for dropped file
34->212
214
Writes to foreign memory
regions
34->214
216
Allocates memory in
foreign processes
34->216
49
RegAsm.exe
34->49
started
218
Injects a PE file into
a foreign processes
36->218
52
RegAsm.exe
36->52
started
54
RegAsm.exe
36->54
started
146
94.156.66.203
TERASYST-ASBG
Bulgaria
40->146
112
C:\Users\user\AppData\Roaming\clnt.exe, PE32
40->112
dropped
114
C:\ProgramData\...\iojmibhyhiws.exe, PE32+
40->114
dropped
220
System process connects
to network (likely due
to code injection or
exploit)
40->220
222
Encrypted powershell
cmdline option found
40->222
224
Creates multiple autostart
registry keys
40->224
226
Tries to evade debugger
and weak emulator (self
modifying code)
40->226
56
cmd.exe
40->56
started
60
5 other processes
40->60
file14
signatures15
process16
dnsIp17
166
Multi AV Scanner detection
for dropped file
42->166
168
Modifies windows update
settings
42->168
170
Disables Windows Defender
Tamper protection
42->170
182
2 other signatures
42->182
172
Detected unpacking (changes
PE section rights)
45->172
62
chrome.exe
47->62
started
65
chrome.exe
47->65
started
67
chrome.exe
47->67
started
75
7 other processes
47->75
118
20.113.35.45
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
49->118
174
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
49->174
176
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
49->176
178
Tries to steal Crypto
Currency Wallets
49->178
120
141.95.211.148
DFNVereinzurFoerderungeinesDeutschenForschungsnetzese
Germany
52->120
180
Tries to harvest and
steal browser information
(history, passwords,
etc)
52->180
77
2 other processes
56->77
69
conhost.exe
58->69
started
71
conhost.exe
58->71
started
73
conhost.exe
60->73
started
79
3 other processes
60->79
signatures18
process19
dnsIp20
148
239.255.255.250
unknown
Reserved
62->148
81
chrome.exe
62->81
started
84
chrome.exe
65->84
started
86
chrome.exe
67->86
started
88
msedge.exe
75->88
started
90
msedge.exe
75->90
started
92
msedge.exe
75->92
started
process21
dnsIp22
122
i.ytimg.com
108.177.122.119
GOOGLEUS
United States
81->122
124
accounts.google.com
108.177.122.84
GOOGLEUS
United States
81->124
126
9 other IPs or domains
81->126
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.