General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbERIZjhRcm4yYVU5aVlxcW1mcUtqMUt4eUstQXxBQ3Jtc0tta25wUWE5T01ZWEFtaURraU1hengxcjRyVEZoWmVuS3dGZkJxMGJfQUlsanYzV1dKNmNTdllDZHFKdlRMdjVSV18zNGRpd0pXUXdOTnhmOWFqcG1GbXJIQXo4Y2ZwcXhjdVNNTWlXUFllZ25NMXB6VQ&q=https%3A%2F%2Fgithub.com%2FAmsterdamA1%2FAmsterdam%2Freleases%2Fdownload%2F2.0%2FSetup.Program.zip&v=nSi4avg7vM4
-
Sample
241126-wj2a1symbj
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbERIZjhRcm4yYVU5aVlxcW1mcUtqMUt4eUstQXxBQ3Jtc0tta25wUWE5T01ZWEFtaURraU1hengxcjRyVEZoWmVuS3dGZkJxMGJfQUlsanYzV1dKNmNTdllDZHFKdlRMdjVSV18zNGRpd0pXUXdOTnhmOWFqcG1GbXJIQXo4Y2ZwcXhjdVNNTWlXUFllZ25NMXB6VQ&q=https%3A%2F%2Fgithub.com%2FAmsterdamA1%2FAmsterdam%2Freleases%2Fdownload%2F2.0%2FSetup.Program.zip&v=nSi4avg7vM4
Resource
win10ltsc2021-20241023-de
Malware Config
Extracted
Protocol: ftp- Host:
188.120.227.9 - Port:
21 - Username:
PK1 - Password:
PK1
Extracted
Protocol: ftp- Host:
193.149.189.199 - Port:
21 - Username:
ins - Password:
installer
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
Extracted
darkcomet
Guest1690
65.38.120.136:1690
DC_MUTEX-F54S21D
-
gencode
U2oxviM8ZSYf
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbERIZjhRcm4yYVU5aVlxcW1mcUtqMUt4eUstQXxBQ3Jtc0tta25wUWE5T01ZWEFtaURraU1hengxcjRyVEZoWmVuS3dGZkJxMGJfQUlsanYzV1dKNmNTdllDZHFKdlRMdjVSV18zNGRpd0pXUXdOTnhmOWFqcG1GbXJIQXo4Y2ZwcXhjdVNNTWlXUFllZ25NMXB6VQ&q=https%3A%2F%2Fgithub.com%2FAmsterdamA1%2FAmsterdam%2Freleases%2Fdownload%2F2.0%2FSetup.Program.zip&v=nSi4avg7vM4
-
Darkcomet family
-
Lumma family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2