Threat name:
LummaC Stealer, Mars Stealer, PrivateLoa
Alert
Classification:
troj.spyw.evad
Adds extensions / path to Windows Defender exclusion list (Registry)
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected Powershell download and execute
Yara detected PrivateLoader
Yara detected PureLog Stealer
Yara detected Socks5Systemz
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1464455
Sample:
1719520929.094843_setup.exe
Startdate:
28/06/2024
Architecture:
WINDOWS
Score:
100
136
service-domain.xyz
2->136
138
api.check-data.xyz
2->138
140
32 other IPs or domains
2->140
162
Found malware configuration
2->162
164
Malicious sample detected
(through community Yara
rule)
2->164
166
Antivirus detection
for dropped file
2->166
170
24 other signatures
2->170
12
1719520929.094843_setup.exe
11
41
2->12
started
17
svchost.exe
2->17
started
19
svchost.exe
2->19
started
21
2 other processes
2->21
signatures3
168
Performs DNS queries
to domains with low
reputation
138->168
process4
dnsIp5
154
vk.com
87.240.132.72, 49712, 49713, 49718
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
12->154
156
ps.userapi.com
87.240.190.76
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
12->156
160
14 other IPs or domains
12->160
128
C:\Users\...\x25ibhClqZEgGGnZMnmShBJ0.exe, PE32+
12->128
dropped
130
C:\Users\...\usxSxed5X8e1lQlz4jrX8VDT.exe, PE32
12->130
dropped
132
C:\Users\...\rjlUhEQ26sSaVorUdPXCNQJL.exe, PE32
12->132
dropped
134
15 other malicious files
12->134
dropped
220
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
12->220
222
Drops PE files to the
document folder of the
user
12->222
224
Creates HTML files with
.exe extension (expired
dropper behavior)
12->224
226
7 other signatures
12->226
23
ZybKZnBqBLCGro2Wl5RdK9Km.exe
12->23
started
26
usxSxed5X8e1lQlz4jrX8VDT.exe
37
12->26
started
30
FHi_DoTMO9n0XLK0ZI3jNefl.exe
12->30
started
32
8 other processes
12->32
158
127.0.0.1
unknown
unknown
17->158
file6
signatures7
process8
dnsIp9
110
C:\Users\...\ZybKZnBqBLCGro2Wl5RdK9Km.tmp, PE32
23->110
dropped
34
ZybKZnBqBLCGro2Wl5RdK9Km.tmp
23->34
started
150
85.28.47.4
GES-ASRU
Russian Federation
26->150
152
77.91.77.81
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
26->152
112
C:\Users\user\AppData\...\KFBAECBAEG.exe, PE32
26->112
dropped
114
C:\Users\user\AppData\...\softokn3[1].dll, PE32
26->114
dropped
116
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
26->116
dropped
124
11 other files (7 malicious)
26->124
dropped
194
Detected unpacking (changes
PE section rights)
26->194
196
Tries to steal Mail
credentials (via file
/ registry access)
26->196
198
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->198
212
4 other signatures
26->212
200
Writes to foreign memory
regions
30->200
202
Allocates memory in
foreign processes
30->202
204
Injects a PE file into
a foreign processes
30->204
37
MSBuild.exe
30->37
started
41
MSBuild.exe
30->41
started
43
MSBuild.exe
30->43
started
118
C:\Users\user\AppData\Local\...\polaris.exe, PE32+
32->118
dropped
120
C:\Users\user\AppData\...\PowerExpertNT.exe, PE32
32->120
dropped
122
C:\Users\user\AppData\Local\...\Install.exe, PE32
32->122
dropped
126
4 other malicious files
32->126
dropped
206
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
32->206
208
Query firmware table
information (likely
to detect VMs)
32->208
210
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
32->210
214
6 other signatures
32->214
45
Install.exe
32->45
started
47
cmd.exe
32->47
started
49
MSBuild.exe
32->49
started
51
9 other processes
32->51
file10
signatures11
process12
dnsIp13
88
C:\Users\user\AppData\...\unins000.exe (copy), PE32
34->88
dropped
90
C:\Users\user\...\totalrecorderfree32_64.exe, PE32
34->90
dropped
92
C:\Users\user\AppData\...\openh264.dll (copy), PE32+
34->92
dropped
102
34 other files (23 malicious)
34->102
dropped
53
totalrecorderfree32_64.exe
34->53
started
56
totalrecorderfree32_64.exe
34->56
started
142
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
37->142
144
77.105.132.27
PLUSTELECOM-ASRU
Russian Federation
37->144
146
2 other IPs or domains
37->146
94
C:\Users\user\AppData\...\rise2806[1].exe, PE32
37->94
dropped
96
C:\Users\user\AppData\Local\...\sqlt[1].dll, PE32
37->96
dropped
104
5 other malicious files
37->104
dropped
172
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
37->172
174
Tries to harvest and
steal ftp login credentials
37->174
176
Tries to steal Crypto
Currency Wallets
37->176
178
Tries to harvest and
steal Bitcoin Wallet
information
37->178
98
C:\Users\user\AppData\Local\...\Install.exe, PE32
45->98
dropped
180
Multi AV Scanner detection
for dropped file
45->180
59
Install.exe
45->59
started
62
polaris.exe
47->62
started
64
conhost.exe
47->64
started
182
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->182
100
C:\Users\user\AppData\Local\...\Install.exe, PE32
51->100
dropped
66
Install.exe
51->66
started
68
conhost.exe
51->68
started
70
conhost.exe
51->70
started
72
5 other processes
51->72
file14
signatures15
process16
dnsIp17
106
C:\ProgramData\...\AGP BUS Driver 6.28.66.exe, PE32
53->106
dropped
148
ejiijal.ua
94.156.8.80
NET1-ASBG
Bulgaria
56->148
216
Multi AV Scanner detection
for dropped file
59->216
218
Modifies Windows Defender
protection settings
59->218
74
cmd.exe
59->74
started
108
C:\Users\user\AppData\Local\...\pokafdw.exe, PE32
62->108
dropped
77
pokafdw.exe
62->77
started
file18
signatures19
process20
signatures21
184
Modifies Windows Defender
protection settings
74->184
79
forfiles.exe
74->79
started
82
conhost.exe
74->82
started
186
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
77->186
188
Query firmware table
information (likely
to detect VMs)
77->188
190
Tries to harvest and
steal ftp login credentials
77->190
192
2 other signatures
77->192
84
Conhost.exe
77->84
started
process22
signatures23
228
Modifies Windows Defender
protection settings
79->228
86
cmd.exe
79->86
started
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.