Threat name:
LummaC, Amadey, LummaC Stealer, XWorm, X
Alert
Classification:
troj.adwa.spyw.expl.evad.mine
.NET source code contains potential unpacker
.NET source code contains very large strings
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Drops PE files to the startup folder
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found pyInstaller with non standard icon
Found strings related to Crypto-Mining
Hides threads from debuggers
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the Security eventlog
Reads the System eventlog
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Sigma detected: Powershell launch regsvr32
Sigma detected: Stop EventLog
Sigma detected: Suspect Svchost Activity
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1585651
Sample:
file.exe
Startdate:
07/01/2025
Architecture:
WINDOWS
Score:
100
157
Found malware configuration
2->157
159
Malicious sample detected
(through community Yara
rule)
2->159
161
Antivirus detection
for URL or domain
2->161
163
25 other signatures
2->163
13
skotes.exe
38
2->13
started
18
file.exe
5
2->18
started
20
yklcfqtilcgt.exe
2->20
started
22
6 other processes
2->22
process3
dnsIp4
147
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
13->147
149
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
13->149
151
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
13->151
117
C:\Users\user\AppData\...\bed2608720.exe, PE32
13->117
dropped
119
C:\Users\user\AppData\...\718e743381.exe, PE32
13->119
dropped
121
C:\Users\user\AppData\...\739ad26354.exe, PE32
13->121
dropped
131
13 other malicious files
13->131
dropped
195
Hides threads from debuggers
13->195
197
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
13->197
199
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
13->199
24
db3cab6cee.exe
13->24
started
28
e44fda3216.exe
13->28
started
31
zjFtdxQ.exe
13->31
started
39
2 other processes
13->39
123
C:\Users\user\AppData\Local\...\skotes.exe, PE32
18->123
dropped
125
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
18->125
dropped
201
Detected unpacking (changes
PE section rights)
18->201
203
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
18->203
205
Tries to evade debugger
and weak emulator (self
modifying code)
18->205
207
Tries to detect virtualization
through RDTSC time measurements
18->207
33
skotes.exe
18->33
started
127
C:\Windows\Temp\aodefromlpug.sys, PE32+
20->127
dropped
209
Multi AV Scanner detection
for dropped file
20->209
211
Modifies the context
of a thread in another
process (thread injection)
20->211
213
Sample is not signed
and drops a device driver
20->213
35
svchost.exe
20->35
started
41
5 other processes
20->41
153
23.56.254.164
GPRS-ASZAINKW
United States
22->153
155
127.0.0.1
unknown
unknown
22->155
129
C:\ProgramData\...\yklcfqtilcgt.exe, PE32+
22->129
dropped
215
Uses powercfg.exe to
modify the power settings
22->215
217
Modifies power options
to not sleep / hibernate
22->217
37
powercfg.exe
22->37
started
43
7 other processes
22->43
file5
signatures6
process7
dnsIp8
93
C:\Users\user\AppData\Local\...\python311.dll, PE32+
24->93
dropped
95
C:\Users\user\AppData\Local\...\python3.dll, PE32+
24->95
dropped
97
C:\Users\user\AppData\Local\...\select.pyd, PE32+
24->97
dropped
107
271 other files (260 malicious)
24->107
dropped
165
Multi AV Scanner detection
for dropped file
24->165
167
Found pyInstaller with
non standard icon
24->167
137
104.21.36.11
CLOUDFLARENETUS
United States
28->137
169
Antivirus detection
for dropped file
28->169
171
Detected unpacking (changes
PE section rights)
28->171
173
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
28->173
185
7 other signatures
28->185
99
C:\Users\user\AppData\Local\...\zjFtdxQ.tmp, PE32
31->99
dropped
45
zjFtdxQ.tmp
31->45
started
175
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
33->175
187
2 other signatures
33->187
139
192.248.189.11
AS-CHOOPAUS
France
35->139
177
Query firmware table
information (likely
to detect VMs)
35->177
179
Found strings related
to Crypto-Mining
35->179
181
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
35->181
48
conhost.exe
37->48
started
141
172.217.18.14
GOOGLEUS
United States
39->141
143
140.82.121.4
GITHUBUS
United States
39->143
145
2 other IPs or domains
39->145
101
C:\Users\user\AppData\Roaming101zL6O1Q.exe, PE32
39->101
dropped
103
C:\Users\user\AppData\Roaming\...103zL6O1Q.exe, PE32
39->103
dropped
105
C:\Users\user\AppData\Roaming\...le.exe, PE32+
39->105
dropped
183
Machine Learning detection
for dropped file
39->183
189
4 other signatures
39->189
50
Ele.exe
39->50
started
53
schtasks.exe
39->53
started
55
cmstp.exe
7
7
39->55
started
61
4 other processes
41->61
57
conhost.exe
43->57
started
59
conhost.exe
43->59
started
63
5 other processes
43->63
file9
signatures10
process11
dnsIp12
109
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
45->109
dropped
111
C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32
45->111
dropped
113
C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32
45->113
dropped
65
zjFtdxQ.exe
45->65
started
133
185.157.162.216
OBE-EUROPEObenetworkEuropeSE
Sweden
50->133
135
66.63.187.122
ASN-QUADRANET-GLOBALUS
United States
50->135
115
C:\Users\user\AppData\Local\Temp\pcqxl.exe, PE32+
50->115
dropped
68
conhost.exe
53->68
started
file13
process14
file15
83
C:\Users\user\AppData\Local\...\zjFtdxQ.tmp, PE32
65->83
dropped
70
zjFtdxQ.tmp
65->70
started
process16
file17
85
C:\Users\user\AppData\Roaming\is-VSE52.tmp, PE32+
70->85
dropped
87
C:\Users\user\AppData\...\9rpcss_1.drv (copy), PE32+
70->87
dropped
89
C:\Users\user\AppData\...\unins000.exe (copy), PE32
70->89
dropped
91
4 other files (3 malicious)
70->91
dropped
73
regsvr32.exe
70->73
started
process18
process19
75
regsvr32.exe
73->75
started
signatures20
191
Suspicious powershell
command line found
75->191
78
powershell.exe
75->78
started
process21
signatures22
193
Loading BitLocker PowerShell
Module
78->193
81
conhost.exe
78->81
started
process23
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.