General
-
Target
2025-05-17_cb08cdb70d3cbb05e986986a5d5b2ad9_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer
-
Size
938KB
-
Sample
250517-r4tz8ahm8t
-
MD5
cb08cdb70d3cbb05e986986a5d5b2ad9
-
SHA1
b0a62c59b3617ceef82144f90b88370cce67af03
-
SHA256
0a4d8f36219df1c6be376c937bbfacf6485159a25f2f716716bff670314fef4f
-
SHA512
17f31084c00c98fb0650ac1d4ec051f2fc21907b479e7d387e467c04ffad0fa6f1d4af4b746a80962c5031586b7221483483f3417e07ce116cea275b08a7c6ff
-
SSDEEP
24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8aM8b:HTvC/MTQYxsWR7aM8
Static task
static1
Behavioral task
behavioral1
Sample
2025-05-17_cb08cdb70d3cbb05e986986a5d5b2ad9_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
http://185.156.72.2/testmine/random.exe
Extracted
lumma
https://6racxilb.digital/ozi
https://narrathfpt.top/tekq
https://jackthyfuc.run/xpas
https://onehunqpom.life/zpxd
https://laminaflbx.shop/twoq
https://dovercovtcg.top/juhd
https://blackswmxc.top/bgry
https://posseswsnc.top/akds
https://featurlyin.top/pdal
https://ninepicchf.bet/lznd
https://uvoznessxyy.life/bnaz
https://zmedtipp.live/mnvzx
https://interpwthc.digital/juab
https://clatteqrpq.digital/kljz
https://overcovtcg.top/juhd
https://blackljjwc.run/banj
https://meteorplyp.live/lekp
https://flowerexju.bet/lanz
https://easterxeen.run/zavc
https://araucahkbm.live/baneb
https://uovercovtcg.top/juhd
Extracted
svcstealer
176.113.115.149
185.81.68.156
Targets
-
-
Target
2025-05-17_cb08cdb70d3cbb05e986986a5d5b2ad9_agent-tesla_amadey_black-basta_cobalt-strike_darkgate_elex_luca-stealer
-
Size
938KB
-
MD5
cb08cdb70d3cbb05e986986a5d5b2ad9
-
SHA1
b0a62c59b3617ceef82144f90b88370cce67af03
-
SHA256
0a4d8f36219df1c6be376c937bbfacf6485159a25f2f716716bff670314fef4f
-
SHA512
17f31084c00c98fb0650ac1d4ec051f2fc21907b479e7d387e467c04ffad0fa6f1d4af4b746a80962c5031586b7221483483f3417e07ce116cea275b08a7c6ff
-
SSDEEP
24576:HqDEvCTbMWu7rQYlBQcBiT6rprG8aM8b:HTvC/MTQYxsWR7aM8
-
Detects Rhadamanthys payload
-
Detects SvcStealer Payload
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Lumma family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
SvcStealer, Diamotrix
SvcStealer aka Diamotrix Clipper is a stealer/downloader written in C++.
-
Svcstealer family
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Modify Registry
1Virtualization/Sandbox Evasion
2Discovery
Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2