Threat name:
LummaC, Amadey, Fabookie, Glupteba, Lumm
Alert
Classification:
phis.troj.spyw.evad.mine
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
LummaC encrypted strings found
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1387310
Sample:
MdO7pWHaxQ.exe
Startdate:
06/02/2024
Architecture:
WINDOWS
Score:
100
142
triangleseasonbenchwj.shop
2->142
144
trad-einmyus.com
2->144
146
16 other IPs or domains
2->146
192
Snort IDS alert for
network traffic
2->192
194
Multi AV Scanner detection
for domain / URL
2->194
196
Found malware configuration
2->196
198
26 other signatures
2->198
11
explorgu.exe
39
2->11
started
16
MdO7pWHaxQ.exe
5
2->16
started
18
uwgxswmtctao.exe
2->18
started
20
svchost.exe
2->20
started
signatures3
process4
dnsIp5
162
185.215.113.32, 49734, 49735, 49737
WHOLESALECONNECTIONSNL
Portugal
11->162
164
109.107.182.3, 49741, 49769, 80
TELEPORT-TV-ASRU
Russian Federation
11->164
166
2 other IPs or domains
11->166
112
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
11->112
dropped
114
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
11->114
dropped
116
C:\Users\user\AppData\Local\...\rwtweewge.exe, PE32
11->116
dropped
122
15 other malicious files
11->122
dropped
250
Multi AV Scanner detection
for dropped file
11->250
252
Detected unpacking (changes
PE section rights)
11->252
254
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
11->254
272
3 other signatures
11->272
22
dayroc.exe
11->22
started
26
lumma123142124.exe
11->26
started
28
rundll32.exe
11->28
started
39
5 other processes
11->39
118
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
16->118
dropped
256
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
16->256
258
Tries to evade debugger
and weak emulator (self
modifying code)
16->258
260
Tries to detect virtualization
through RDTSC time measurements
16->260
262
Potentially malicious
time measurement code
found
16->262
120
C:\Windows\Temp\rljxappkaarw.sys, PE32+
18->120
dropped
264
Injects code into the
Windows Explorer (explorer.exe)
18->264
266
Modifies the context
of a thread in another
process (thread injection)
18->266
268
Sample is not signed
and drops a device driver
18->268
30
explorer.exe
18->30
started
270
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
20->270
33
WerFault.exe
20->33
started
35
WerFault.exe
20->35
started
37
WerFault.exe
20->37
started
file6
signatures7
process8
dnsIp9
96
C:\Users\user\AppData\Local\...\toolspub1.exe, PE32
22->96
dropped
98
C:\Users\user\AppData\Local\Temp\rty25.exe, PE32+
22->98
dropped
100
C:\...\d21cbe21e38b385a41a68c5e6dd32f4c.exe, PE32
22->100
dropped
102
C:\Users\user\...\InstallSetup_nine.exe, PE32
22->102
dropped
202
Multi AV Scanner detection
for dropped file
22->202
41
InstallSetup_nine.exe
22->41
started
46
toolspub1.exe
22->46
started
48
d21cbe21e38b385a41a68c5e6dd32f4c.exe
22->48
started
50
rty25.exe
22->50
started
204
Contains functionality
to inject code into
remote processes
26->204
206
Writes to foreign memory
regions
26->206
208
Allocates memory in
foreign processes
26->208
222
2 other signatures
26->222
52
RegAsm.exe
26->52
started
58
4 other processes
26->58
54
rundll32.exe
21
28->54
started
168
pool.hashvault.pro
142.202.242.43, 49751, 80
1GSERVERSUS
Reserved
30->168
210
System process connects
to network (likely due
to code injection or
exploit)
30->210
212
Benign windows process
drops PE files
30->212
214
Query firmware table
information (likely
to detect VMs)
30->214
170
45.15.156.209
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
39->170
104
C:\ProgramData\...\uwgxswmtctao.exe, PE32+
39->104
dropped
216
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
39->216
218
Tries to harvest and
steal browser information
(history, passwords,
etc)
39->218
220
Tries to steal Crypto
Currency Wallets
39->220
56
RegAsm.exe
39->56
started
60
5 other processes
39->60
file10
signatures11
process12
dnsIp13
148
185.172.128.109, 49771, 80
NADYMSS-ASRU
Russian Federation
41->148
158
2 other IPs or domains
41->158
106
C:\Users\user\AppData\Local\Temp\u5h8.1.exe, PE32
41->106
dropped
108
C:\Users\user\AppData\Local\Temp\u5h8.0.exe, PE32
41->108
dropped
224
Multi AV Scanner detection
for dropped file
41->224
226
Detected unpacking (changes
PE section rights)
41->226
228
Detected unpacking (overwrites
its own PE header)
41->228
62
u5h8.0.exe
41->62
started
67
u5h8.1.exe
41->67
started
230
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
46->230
232
Maps a DLL or memory
area into another process
46->232
248
2 other signatures
46->248
69
explorer.exe
46->69
injected
234
Found Tor onion address
48->234
150
i.alie3ksgaa.com
154.92.15.189, 443, 49767
HKKFGL-AS-APHKKwaifongGroupLimitedHK
Seychelles
50->150
110
C:\Users\...\835d07a222c97e14d53523dd74d39388, SQLite
50->110
dropped
236
Detected unpacking (creates
a PE file in dynamic
memory)
50->236
238
Tries to harvest and
steal browser information
(history, passwords,
etc)
50->238
152
secretionsuitcasenioise.shop
104.21.16.152, 443, 49746
CLOUDFLARENETUS
United States
52->152
154
claimconcessionrebe.shop
104.21.58.31, 443, 49747
CLOUDFLARENETUS
United States
52->154
160
3 other IPs or domains
52->160
71
WerFault.exe
52->71
started
240
Tries to steal Instant
Messenger accounts or
passwords
54->240
242
Uses netsh to modify
the Windows network
and firewall settings
54->242
244
Tries to harvest and
steal ftp login credentials
54->244
246
Tries to harvest and
steal WLAN passwords
54->246
73
powershell.exe
26
54->73
started
75
netsh.exe
2
54->75
started
156
mealroomrallpassiveer.shop
104.21.47.178
CLOUDFLARENETUS
United States
56->156
77
WerFault.exe
56->77
started
79
conhost.exe
60->79
started
81
3 other processes
60->81
file14
signatures15
process16
dnsIp17
172
185.172.128.79
NADYMSS-ASRU
Russian Federation
62->172
124
C:\Users\user\AppData\...\softokn3[1].dll, PE32
62->124
dropped
126
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
62->126
dropped
128
C:\Users\user\AppData\...\mozglue[1].dll, PE32
62->128
dropped
140
9 other files (4 malicious)
62->140
dropped
178
Detected unpacking (changes
PE section rights)
62->178
180
Detected unpacking (overwrites
its own PE header)
62->180
182
Tries to steal Mail
credentials (via file
/ registry access)
62->182
190
3 other signatures
62->190
184
Multi AV Scanner detection
for dropped file
67->184
83
cmd.exe
67->83
started
174
trad-einmyus.com
185.12.126.182
QWARTARU
Russian Federation
69->174
176
brusuax.com
211.40.39.251
LGDACOMLGDACOMCorporationKR
Korea Republic of
69->176
130
C:\Users\user\AppData\Roaming\ejsgdit, PE32
69->130
dropped
132
C:\Users\user\AppData\Local\Temp\F965.exe, PE32
69->132
dropped
134
C:\Users\user\AppData\Local\Temp\F955.exe, PE32
69->134
dropped
136
C:\Users\user\AppData\Local\Temp\C18B.exe, PE32
69->136
dropped
186
System process connects
to network (likely due
to code injection or
exploit)
69->186
188
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
69->188
138
C:\Users\user\...\246122658369_Desktop.zip, Zip
73->138
dropped
86
conhost.exe
73->86
started
88
conhost.exe
75->88
started
file18
signatures19
process20
signatures21
200
Uses schtasks.exe or
at.exe to add and modify
task schedules
83->200
90
conhost.exe
83->90
started
92
chcp.com
83->92
started
94
schtasks.exe
83->94
started
process22
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://193.233.132.167/mine/amert.exe