Threat name:
LummaC, Python Stealer, Amadey, LummaC S
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Generic Python Stealer
Yara detected LummaC Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1406850
Sample:
tc7xnBGY8Z.exe
Startdate:
11/03/2024
Architecture:
WINDOWS
Score:
100
134
www.youtube.com
2->134
136
www.facebook.com
2->136
138
26 other IPs or domains
2->138
188
Snort IDS alert for
network traffic
2->188
190
Found malware configuration
2->190
192
Malicious sample detected
(through community Yara
rule)
2->192
194
27 other signatures
2->194
10
explorgu.exe
2
46
2->10
started
15
tc7xnBGY8Z.exe
5
2->15
started
17
MPGPH131.exe
2->17
started
19
3 other processes
2->19
signatures3
process4
dnsIp5
150
185.215.113.32, 49735, 49736, 49738
WHOLESALECONNECTIONSNL
Portugal
10->150
152
bloodshso.online
185.143.223.50
INFORMTECH-ASRU
Russian Federation
10->152
154
2 other IPs or domains
10->154
112
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
10->112
dropped
114
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
10->114
dropped
116
C:\Users\user\AppData\Local\...\amadka.exe, PE32
10->116
dropped
120
17 other malicious files
10->120
dropped
230
Antivirus detection
for dropped file
10->230
232
Multi AV Scanner detection
for dropped file
10->232
234
Detected unpacking (changes
PE section rights)
10->234
246
4 other signatures
10->246
21
judith.exe
10->21
started
25
alex12341.exe
10->25
started
27
osminog.exe
2
10->27
started
29
7 other processes
10->29
118
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
15->118
dropped
236
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
15->236
238
Tries to evade debugger
and weak emulator (self
modifying code)
15->238
240
Tries to detect virtualization
through RDTSC time measurements
15->240
242
Machine Learning detection
for dropped file
17->242
244
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->244
file6
signatures7
process8
dnsIp9
96
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
21->96
dropped
98
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
21->98
dropped
100
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
21->100
dropped
108
32 other files (31 malicious)
21->108
dropped
196
Multi AV Scanner detection
for dropped file
21->196
198
Machine Learning detection
for dropped file
21->198
200
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
21->200
32
stub.exe
21->32
started
202
Antivirus detection
for dropped file
25->202
204
Writes to foreign memory
regions
25->204
206
Allocates memory in
foreign processes
25->206
36
RegAsm.exe
25->36
started
39
conhost.exe
25->39
started
208
Contains functionality
to inject code into
remote processes
27->208
210
Injects a PE file into
a foreign processes
27->210
212
LummaC encrypted strings
found
27->212
41
RegAsm.exe
27->41
started
43
conhost.exe
27->43
started
156
217.195.207.156
ASFIBERSUNUCUTR
Turkey
29->156
158
ipinfo.io
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
29->158
160
db-ip.com
104.26.5.15
CLOUDFLARENETUS
United States
29->160
102
C:\Users\user\...\qAloBqkioUuRGfzCVY_2.exe, PE32
29->102
dropped
104
C:\Users\user\AppData\Local\...dgeMS131.exe, PE32
29->104
dropped
106
C:\Users\user\AppData\Local\...\RageMP131.exe, PE32
29->106
dropped
110
5 other malicious files
29->110
dropped
214
System process connects
to network (likely due
to code injection or
exploit)
29->214
216
Detected unpacking (changes
PE section rights)
29->216
218
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
29->218
220
7 other signatures
29->220
45
rundll32.exe
21
29->45
started
47
RegAsm.exe
29->47
started
49
Reload.exe
29->49
started
51
7 other processes
29->51
file10
signatures11
process12
dnsIp13
124
127.0.0.1
unknown
unknown
32->124
162
Multi AV Scanner detection
for dropped file
32->162
164
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
32->164
166
Potentially malicious
time measurement code
found
32->166
53
cmd.exe
32->53
started
55
cmd.exe
32->55
started
70
6 other processes
32->70
92
C:\Users\user\AppData\Roaming\...\olehpsp.exe, PE32
36->92
dropped
94
C:\Users\user\AppData\Roaming\...\TWO.exe, PE32
36->94
dropped
57
olehpsp.exe
36->57
started
61
TWO.exe
36->61
started
126
resergvearyinitiani.shop
172.67.217.100, 443, 49740, 49744
CLOUDFLARENETUS
United States
41->126
168
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
41->168
170
Query firmware table
information (likely
to detect VMs)
41->170
172
Found many strings related
to Crypto-Wallets (likely
being stolen)
41->172
174
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
41->174
176
Tries to steal Instant
Messenger accounts or
passwords
45->176
178
Uses netsh to modify
the Windows network
and firewall settings
45->178
180
Tries to harvest and
steal ftp login credentials
45->180
182
Tries to harvest and
steal WLAN passwords
45->182
63
powershell.exe
45->63
started
66
netsh.exe
45->66
started
128
20.218.68.91, 49748, 7690
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
47->128
184
Tries to steal Crypto
Currency Wallets
47->184
130
associationokeo.shop
172.67.147.18
CLOUDFLARENETUS
United States
49->130
186
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->186
132
239.255.255.250
unknown
Reserved
51->132
68
chrome.exe
51->68
started
72
5 other processes
51->72
file14
signatures15
process16
dnsIp17
74
conhost.exe
53->74
started
76
WMIC.exe
53->76
started
78
conhost.exe
55->78
started
80
WMIC.exe
55->80
started
140
5.42.65.31
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
57->140
222
Multi AV Scanner detection
for dropped file
57->222
224
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
57->224
226
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
57->226
142
185.172.128.33
NADYMSS-ASRU
Russian Federation
61->142
228
Tries to steal Crypto
Currency Wallets
61->228
122
C:\Users\user\...\246122658369_Desktop.zip, Zip
63->122
dropped
82
conhost.exe
63->82
started
84
conhost.exe
66->84
started
144
www.youtube.com
68->144
146
www.facebook.com
68->146
148
2 other IPs or domains
68->148
86
conhost.exe
70->86
started
88
conhost.exe
70->88
started
90
8 other processes
70->90
file18
signatures19
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.