Threat name:
GCleaner, Glupteba, LummaC Stealer, Mars
Alert
Classification:
rans.troj.spyw.evad.mine
.NET source code contains method to dynamically call methods (often used by packers)
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1425038
Sample:
SecuriteInfo.com.Win64.Evo-...
Startdate:
12/04/2024
Architecture:
WINDOWS
Score:
100
112
a.574859385.xyz
2->112
114
t.me
2->114
116
21 other IPs or domains
2->116
136
Multi AV Scanner detection
for domain / URL
2->136
138
Found malware configuration
2->138
140
Malicious sample detected
(through community Yara
rule)
2->140
144
26 other signatures
2->144
9
SecuriteInfo.com.Win64.Evo-gen.28136.30716.exe
11
58
2->9
started
14
svchost.exe
2->14
started
16
svchost.exe
2->16
started
18
2 other processes
2->18
signatures3
142
Performs DNS queries
to domains with low
reputation
112->142
process4
dnsIp5
130
a.574859385.xyz
23.137.249.94
GTLAKESUS
Reserved
9->130
132
185.215.113.46, 49710, 80
WHOLESALECONNECTIONSNL
Portugal
9->132
134
22 other IPs or domains
9->134
92
C:\Users\...\xF8wwnvV7VSPLG6odA_kUMNE.exe, PE32
9->92
dropped
94
C:\Users\...\pXSDyS6i2m_eI_qg3pp5HEjN.exe, PE32
9->94
dropped
96
C:\Users\...\oBmS_v_1KyZtw2vx9RhHBuTc.exe, PE32
9->96
dropped
98
30 other malicious files
9->98
dropped
192
Query firmware table
information (likely
to detect VMs)
9->192
194
Drops PE files to the
document folder of the
user
9->194
196
Creates HTML files with
.exe extension (expired
dropper behavior)
9->196
198
11 other signatures
9->198
20
dsdzwO9zciWHADOWVbuoiWl0.exe
9->20
started
25
OGqyz0X7jMWNb2o61ZoNmk0z.exe
9->25
started
27
5BRYkzMBWPTHUlR0etpFq_rO.exe
9->27
started
31
15 other processes
9->31
29
WerFault.exe
14->29
started
file6
signatures7
process8
dnsIp9
118
185.172.128.228
NADYMSS-ASRU
Russian Federation
20->118
120
185.172.128.26
NADYMSS-ASRU
Russian Federation
20->120
74
C:\Users\user\AppData\...\DAFIEHIEGD.exe, PE32
20->74
dropped
86
13 other files (9 malicious)
20->86
dropped
166
Detected unpacking (changes
PE section rights)
20->166
168
Detected unpacking (overwrites
its own PE header)
20->168
170
Tries to steal Mail
credentials (via file
/ registry access)
20->170
186
4 other signatures
20->186
188
3 other signatures
25->188
33
RegAsm.exe
25->33
started
38
conhost.exe
25->38
started
122
193.233.132.226
FREE-NET-ASFREEnetEU
Russian Federation
27->122
76
C:\Users\user\...\oVli2fr9CbZSeAMCYvs9.exe, PE32
27->76
dropped
78
C:\Users\user\...\SgYF_ET9kWqa1EPxTSmH.exe, PE32
27->78
dropped
88
7 other malicious files
27->88
dropped
172
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
27->172
174
Found stalling execution
ending in API Sleep
call
27->174
176
Creates multiple autostart
registry keys
27->176
178
Writes many files with
high entropy
27->178
124
185.172.128.90
NADYMSS-ASRU
Russian Federation
31->124
126
193.233.132.74
FREE-NET-ASFREEnetEU
Russian Federation
31->126
128
193.233.132.253
FREE-NET-ASFREEnetEU
Russian Federation
31->128
80
C:\Users\...\bYg8qNOB01YhcDjyq5v3mI8q.tmp, PE32
31->80
dropped
82
C:\Users\user\AppData\...\Protect544cd51a.dll, PE32
31->82
dropped
84
C:\Users\user\AppData\Local\...\notepad.exe, PE32+
31->84
dropped
90
7 other malicious files
31->90
dropped
180
Query firmware table
information (likely
to detect VMs)
31->180
182
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
31->182
184
Found Tor onion address
31->184
190
20 other signatures
31->190
40
bYg8qNOB01YhcDjyq5v3mI8q.tmp
31->40
started
42
RegAsm.exe
31->42
started
44
RegAsm.exe
31->44
started
46
13 other processes
31->46
file10
signatures11
process12
dnsIp13
100
t.me
149.154.167.99
TELEGRAMRU
United Kingdom
33->100
102
195.201.47.150
HETZNER-ASDE
Germany
33->102
104
162.19.138.79
CENTURYLINK-US-LEGACY-QWESTUS
United States
33->104
56
C:\Users\user\AppData\Local\...\sqln[1].dll, PE32
33->56
dropped
58
C:\Users\user\AppData\...\Soft123[1].exe, PE32+
33->58
dropped
70
2 other malicious files
33->70
dropped
146
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
33->146
148
Installs new ROOT certificates
33->148
150
Tries to harvest and
steal ftp login credentials
33->150
152
Tries to harvest and
steal Bitcoin Wallet
information
33->152
60
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
40->60
dropped
62
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
40->62
dropped
64
C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32
40->64
dropped
72
12 other files (11 malicious)
40->72
dropped
106
5.42.65.50
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
42->106
154
Tries to harvest and
steal browser information
(history, passwords,
etc)
42->154
156
Tries to steal Crypto
Currency Wallets
42->156
158
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
44->158
160
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
44->160
162
Writes many files with
high entropy
44->162
108
db-ip.com
104.26.5.15
CLOUDFLARENETUS
United States
46->108
110
217.195.207.156
ASFIBERSUNUCUTR
Turkey
46->110
66
C:\Users\user\AppData\Local\...\fYEtSpT.exe, PE32
46->66
dropped
68
C:\Users\user\...\bidH44rbilPVUafJWZ_qqDb.zip, Zip
46->68
dropped
164
Tries to steal Mail
credentials (via file
/ registry access)
46->164
48
conhost.exe
46->48
started
50
conhost.exe
46->50
started
52
conhost.exe
46->52
started
54
3 other processes
46->54
file14
signatures15
process16
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.