Threat name:
LummaC, Amadey, LummaC Stealer, PureLog
Alert
Classification:
troj.spyw.expl.evad
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to start a terminal service
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1551740
Sample:
file.exe
Startdate:
08/11/2024
Architecture:
WINDOWS
Score:
100
136
Multi AV Scanner detection
for domain / URL
2->136
138
Found malware configuration
2->138
140
Antivirus detection
for URL or domain
2->140
142
24 other signatures
2->142
10
axplong.exe
2
53
2->10
started
15
file.exe
5
2->15
started
17
Application.exe
2->17
started
19
4 other processes
2->19
process3
dnsIp4
126
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
10->126
128
185.215.113.36
WHOLESALECONNECTIONSNL
Portugal
10->128
98
C:\Users\user\AppData\...\3d3b106131.exe, PE32
10->98
dropped
100
C:\Users\user\AppData\...\f0cd2abec1.exe, PE32
10->100
dropped
102
C:\Users\user\AppData\Local\...\bqkriy6l.exe, PE32
10->102
dropped
108
23 other malicious files
10->108
dropped
172
Creates multiple autostart
registry keys
10->172
174
Hides threads from debuggers
10->174
176
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->176
21
stealc_default2.exe
34
10->21
started
26
f86nrrc6.exe
10->26
started
28
e475dc68dc.exe
10->28
started
40
2 other processes
10->40
104
C:\Users\user\AppData\Local\...\axplong.exe, PE32
15->104
dropped
106
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
15->106
dropped
178
Detected unpacking (changes
PE section rights)
15->178
180
Tries to evade debugger
and weak emulator (self
modifying code)
15->180
182
Tries to detect virtualization
through RDTSC time measurements
15->182
30
axplong.exe
15->30
started
184
Antivirus detection
for dropped file
17->184
186
Multi AV Scanner detection
for dropped file
17->186
188
Contains functionality
to start a terminal
service
17->188
194
3 other signatures
17->194
32
AppLaunch.exe
17->32
started
34
AppLaunch.exe
17->34
started
190
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
19->190
192
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->192
36
EcoCraft.scr
19->36
started
38
EcoCraft.scr
19->38
started
file5
signatures6
process7
dnsIp8
120
185.215.113.17
WHOLESALECONNECTIONSNL
Portugal
21->120
80
C:\Users\user\AppData\...\softokn3[1].dll, PE32
21->80
dropped
82
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
21->82
dropped
84
C:\Users\user\AppData\...\mozglue[1].dll, PE32
21->84
dropped
90
9 other files (5 malicious)
21->90
dropped
144
Multi AV Scanner detection
for dropped file
21->144
146
Tries to steal Mail
credentials (via file
/ registry access)
21->146
148
Found many strings related
to Crypto-Wallets (likely
being stolen)
21->148
164
6 other signatures
21->164
122
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
26->122
124
172.67.131.150
CLOUDFLARENETUS
United States
26->124
150
Detected unpacking (changes
PE section rights)
26->150
152
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
26->152
154
Query firmware table
information (likely
to detect VMs)
26->154
166
4 other signatures
26->166
86
C:\ProgramData\ogriIqEF\Application.exe, PE32
28->86
dropped
156
Contains functionality
to start a terminal
service
28->156
158
Writes to foreign memory
regions
28->158
160
Injects a PE file into
a foreign processes
28->160
42
AppLaunch.exe
28->42
started
46
AppLaunch.exe
28->46
started
49
AppLaunch.exe
28->49
started
162
Tries to evade debugger
and weak emulator (self
modifying code)
30->162
168
2 other signatures
30->168
88
C:\Users\user\AppData\Local\...behaviorgraphxtuum.exe, PE32
40->88
dropped
51
cmd.exe
40->51
started
53
Gxtuum.exe
40->53
started
file9
signatures10
process11
dnsIp12
130
185.215.113.217
WHOLESALECONNECTIONSNL
Portugal
42->130
132
185.156.72.65
ITDELUXE-ASRU
Russian Federation
42->132
134
2 other IPs or domains
42->134
110
C:\Users\user\AppData\Local\...\te3tlsre.exe, PE32
42->110
dropped
112
C:\Users\user\AppData\Local\...\mixtwo.exe, PE32
42->112
dropped
114
C:\Users\user\AppData\Local\...\cdata.exe, PE32+
42->114
dropped
118
3 other malicious files
42->118
dropped
55
cdata.exe
42->55
started
196
Creates HTML files with
.exe extension (expired
dropper behavior)
46->196
116
C:\Users\user\AppData\...\Jurisdiction.pif, PE32
51->116
dropped
198
Drops PE files with
a suspicious file extension
51->198
200
Uses schtasks.exe or
at.exe to add and modify
task schedules
51->200
58
Jurisdiction.pif
51->58
started
61
conhost.exe
51->61
started
63
tasklist.exe
51->63
started
65
7 other processes
51->65
202
Contains functionality
to start a terminal
service
53->202
file13
signatures14
process15
file16
92
C:\Users\user\AppData\Local\...\cdata.dll, PE32+
55->92
dropped
94
C:\Users\user\AppData\Local\...coCraft.scr, PE32
58->94
dropped
96
C:\Users\user\AppData\Local\...coCraft.js, ASCII
58->96
dropped
170
Drops PE files with
a suspicious file extension
58->170
67
cmd.exe
58->67
started
70
cmd.exe
58->70
started
signatures17
process18
file19
78
C:\Users\user\AppData\...coCraft.url, MS
67->78
dropped
72
conhost.exe
67->72
started
74
conhost.exe
70->74
started
76
schtasks.exe
70->76
started
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.