Threat name:
LummaC, Amadey, Babadeda, LummaC Stealer
Alert
Classification:
troj.spyw.expl.evad
Adds extensions / path to Windows Defender exclusion list (Registry)
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Modifies Windows Defender protection settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sigma detected: Disable power options
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Stop EventLog
Sigma detected: Suspicious Scheduled Task Creation Involving Temp Folder
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected MSILDownloaderGeneric
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1477166
Sample:
file.exe
Startdate:
20/07/2024
Architecture:
WINDOWS
Score:
100
145
service-domain.xyz
2->145
147
api4.check-data.xyz
2->147
149
59 other IPs or domains
2->149
175
Snort IDS alert for
network traffic
2->175
177
Multi AV Scanner detection
for domain / URL
2->177
179
Found malware configuration
2->179
183
34 other signatures
2->183
13
file.exe
11
39
2->13
started
18
Install.exe
2->18
started
20
eqtpkqwqodik.exe
2->20
started
22
4 other processes
2->22
signatures3
181
Performs DNS queries
to domains with low
reputation
147->181
process4
dnsIp5
167
77.105.133.27, 49737, 49738, 80
PLUSTELECOM-ASRU
Russian Federation
13->167
169
applyzxcksdia.shop
188.114.96.3, 443, 49741, 49742
CLOUDFLARENETUS
European Union
13->169
173
10 other IPs or domains
13->173
135
C:\Users\...\uwpIVud1clvFptUiFgQbbIcX.exe, PE32
13->135
dropped
137
C:\Users\...\kFR1R6LeJNOVvKrvCPtI5B_x.exe, PE32
13->137
dropped
139
C:\Users\...\i7kUZqgfTxbisV2a4qx6tKH7.exe, PE32
13->139
dropped
143
20 other malicious files
13->143
dropped
239
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
13->239
241
Drops PE files to the
document folder of the
user
13->241
243
Found many strings related
to Crypto-Wallets (likely
being stolen)
13->243
253
6 other signatures
13->253
24
uwpIVud1clvFptUiFgQbbIcX.exe
1
39
13->24
started
29
QPRDE0Ersq6_gbAzazLp7VgT.exe
13->29
started
31
DLzIuWZG9ZLwNSCCdBYR4lBu.exe
3
13->31
started
35
8 other processes
13->35
141
C:\Windows\Temp\...\WQDXzFd.exe, PE32
18->141
dropped
245
Very long command line
found
18->245
247
Modifies Windows Defender
protection settings
18->247
33
powershell.exe
18->33
started
249
Multi AV Scanner detection
for dropped file
20->249
251
Found direct / indirect
Syscall (likely to bypass
EDR)
20->251
171
127.0.0.1
unknown
unknown
22->171
file6
signatures7
process8
dnsIp9
155
85.28.47.31
GES-ASRU
Russian Federation
24->155
157
77.91.77.81
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
24->157
159
2 other IPs or domains
24->159
95
C:\Users\user\DocumentsIDBAFHDGDG.exe, PE32
24->95
dropped
97
C:\Users\user\AppData\...\softokn3[1].dll, PE32
24->97
dropped
99
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
24->99
dropped
109
13 other files (9 malicious)
24->109
dropped
187
Detected unpacking (changes
PE section rights)
24->187
189
Drops PE files to the
document folder of the
user
24->189
191
Tries to steal Mail
credentials (via file
/ registry access)
24->191
207
7 other signatures
24->207
37
cmd.exe
24->37
started
39
cmd.exe
24->39
started
101
C:\Users\...\QPRDE0Ersq6_gbAzazLp7VgT.tmp, PE32
29->101
dropped
41
QPRDE0Ersq6_gbAzazLp7VgT.tmp
29->41
started
193
Writes to foreign memory
regions
31->193
195
Allocates memory in
foreign processes
31->195
197
Injects a PE file into
a foreign processes
31->197
44
MSBuild.exe
31->44
started
199
Modifies Windows Defender
protection settings
33->199
54
2 other processes
33->54
103
C:\Users\user\AppData\...\PowerExpertNT.exe, PE32
35->103
dropped
105
C:\Users\user\AppData\Local\...\Install.exe, PE32
35->105
dropped
107
C:\Users\user\AppData\...xtreamFanV5.exe, PE32
35->107
dropped
111
2 other malicious files
35->111
dropped
201
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
35->201
203
Query firmware table
information (likely
to detect VMs)
35->203
205
Contains functionality
to inject code into
remote processes
35->205
209
5 other signatures
35->209
48
Install.exe
35->48
started
50
MSBuild.exe
35->50
started
52
sc.exe
35->52
started
56
10 other processes
35->56
file10
signatures11
process12
dnsIp13
58
userAAFIJKKEHJ.exe
37->58
started
62
conhost.exe
37->62
started
64
conhost.exe
39->64
started
113
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
41->113
dropped
115
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
41->115
dropped
117
C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32
41->117
dropped
129
34 other files (23 malicious)
41->129
dropped
66
audiooutputswitcher32_64.exe
41->66
started
68
audiooutputswitcher32_64.exe
41->68
started
161
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
44->161
163
77.105.132.27
PLUSTELECOM-ASRU
Russian Federation
44->163
165
2 other IPs or domains
44->165
119
C:\Users\user\AppData\...\warsong[1].exe, PE32
44->119
dropped
121
C:\Users\user\AppData\...\djsoftware[1].exe, PE32
44->121
dropped
123
C:\ProgramData\BKJDGCGDAA.exe, PE32
44->123
dropped
125
C:\ProgramData\BFBGDGIDBA.exe, PE32
44->125
dropped
229
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
44->229
231
Tries to steal Crypto
Currency Wallets
44->231
233
Tries to harvest and
steal Bitcoin Wallet
information
44->233
127
C:\Users\user\AppData\Local\...\Install.exe, PE32
48->127
dropped
71
Install.exe
48->71
started
235
Tries to harvest and
steal ftp login credentials
50->235
237
Tries to harvest and
steal browser information
(history, passwords,
etc)
50->237
75
2 other processes
52->75
73
conhost.exe
56->73
started
77
7 other processes
56->77
file14
signatures15
process16
dnsIp17
131
C:\Users\user\AppData\Local\...\explorti.exe, PE32
58->131
dropped
213
Antivirus detection
for dropped file
58->213
215
Detected unpacking (changes
PE section rights)
58->215
217
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
58->217
227
6 other signatures
58->227
133
C:\...\BACKEND Design Tool 7.19.66.exe, PE32
66->133
dropped
151
aqgvznu.ru
94.156.8.80
NET1-ASBG
Bulgaria
68->151
153
89.105.201.183
NOVOSERVE-ASNL
Netherlands
68->153
219
Multi AV Scanner detection
for dropped file
71->219
221
Very long command line
found
71->221
223
Uses schtasks.exe or
at.exe to add and modify
task schedules
71->223
225
Modifies Windows Defender
protection settings
71->225
79
forfiles.exe
71->79
started
81
schtasks.exe
71->81
started
file18
signatures19
process20
process21
83
cmd.exe
79->83
started
86
conhost.exe
79->86
started
88
conhost.exe
81->88
started
signatures22
185
Suspicious powershell
command line found
83->185
90
powershell.exe
83->90
started
process23
signatures24
211
Modifies Windows Defender
protection settings
90->211
93
WMIC.exe
90->93
started
process25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.