Threat name:
LummaC, Amadey, LummaC Stealer, Stealc,
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1547066
Sample:
lkIbbNB9ba.exe
Startdate:
01/11/2024
Architecture:
WINDOWS
Score:
100
142
Found malware configuration
2->142
144
Antivirus detection
for dropped file
2->144
146
Antivirus / Scanner
detection for submitted
sample
2->146
148
22 other signatures
2->148
10
axplong.exe
2
49
2->10
started
15
lkIbbNB9ba.exe
5
2->15
started
17
axplong.exe
2->17
started
19
2 other processes
2->19
process3
dnsIp4
136
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
10->136
138
185.215.113.36
WHOLESALECONNECTIONSNL
Portugal
10->138
140
162.159.130.233
CLOUDFLARENETUS
United States
10->140
106
C:\Users\user\AppData\...\8c68419b66.exe, PE32
10->106
dropped
108
C:\Users\user\AppData\...\66c5ef8faa.exe, PE32
10->108
dropped
110
C:\Users\user\AppData\Local\...\yxrd0ob7.exe, PE32
10->110
dropped
116
19 other malicious files
10->116
dropped
190
Creates multiple autostart
registry keys
10->190
192
Hides threads from debuggers
10->192
194
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->194
21
stealc_default2.exe
34
10->21
started
26
6fa8fd34cc.exe
10->26
started
28
GOLD1234.exe
10->28
started
36
6 other processes
10->36
112
C:\Users\user\AppData\Local\...\axplong.exe, PE32
15->112
dropped
114
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
15->114
dropped
196
Detected unpacking (changes
PE section rights)
15->196
198
Tries to evade debugger
and weak emulator (self
modifying code)
15->198
200
Tries to detect virtualization
through RDTSC time measurements
15->200
30
axplong.exe
15->30
started
202
Multi AV Scanner detection
for dropped file
17->202
204
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->204
206
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
19->206
32
EcoCraft.scr
19->32
started
34
EcoCraft.scr
19->34
started
file5
signatures6
process7
dnsIp8
118
185.215.113.17
WHOLESALECONNECTIONSNL
Portugal
21->118
80
C:\Users\user\AppData\...\softokn3[1].dll, PE32
21->80
dropped
82
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
21->82
dropped
84
C:\Users\user\AppData\...\mozglue[1].dll, PE32
21->84
dropped
92
9 other files (5 malicious)
21->92
dropped
150
Multi AV Scanner detection
for dropped file
21->150
152
Tries to steal Mail
credentials (via file
/ registry access)
21->152
154
Found many strings related
to Crypto-Wallets (likely
being stolen)
21->154
168
6 other signatures
21->168
120
188.114.97.3
CLOUDFLARENETUS
European Union
26->120
86
C:\Users\user\...\HL3SAHJJS22W980QIOTJ.exe, PE32
26->86
dropped
156
Detected unpacking (changes
PE section rights)
26->156
158
Query firmware table
information (likely
to detect VMs)
26->158
160
Tries to evade debugger
and weak emulator (self
modifying code)
26->160
170
2 other signatures
28->170
38
GOLD1234.exe
28->38
started
43
WerFault.exe
28->43
started
45
conhost.exe
28->45
started
53
2 other processes
28->53
172
3 other signatures
30->172
122
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
36->122
124
104.21.32.196
CLOUDFLARENETUS
United States
36->124
126
104.102.49.254
AKAMAI-ASUS
United States
36->126
88
C:\...\OXUBGUS6EPL5W8HQ3YKD35KQ42125Z.exe, PE32
36->88
dropped
90
C:\ProgramData\LgAmARwZ\Application.exe, PE32
36->90
dropped
162
Contains functionality
to start a terminal
service
36->162
164
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
36->164
166
Writes to foreign memory
regions
36->166
174
2 other signatures
36->174
47
cmd.exe
36->47
started
49
RegAsm.exe
36->49
started
51
RegAsm.exe
36->51
started
55
2 other processes
36->55
file9
signatures10
process11
dnsIp12
128
104.21.33.140
CLOUDFLARENETUS
United States
38->128
94
C:\Users\user\...\XJ7ITLBVZJR9J1CE1KPDTWP.exe, PE32
38->94
dropped
176
Query firmware table
information (likely
to detect VMs)
38->176
178
Tries to harvest and
steal ftp login credentials
38->178
180
Tries to harvest and
steal browser information
(history, passwords,
etc)
38->180
182
Tries to steal Crypto
Currency Wallets
38->182
130
104.208.16.94
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
43->130
96
C:\Users\user\AppData\...\Jurisdiction.pif, PE32
47->96
dropped
184
Drops PE files with
a suspicious file extension
47->184
186
Uses schtasks.exe or
at.exe to add and modify
task schedules
47->186
57
Jurisdiction.pif
47->57
started
61
conhost.exe
47->61
started
63
tasklist.exe
47->63
started
65
7 other processes
47->65
132
185.215.113.217
WHOLESALECONNECTIONSNL
Portugal
49->132
134
103.130.147.211
MYREPUBLIC-AS-IDPTEkaMasRepublikID
Turkey
49->134
98
C:\Users\user\AppData\Local\Temp\...\5.exe, PE32
49->98
dropped
100
C:\Users\user\AppData\Local\...\5[1].exe, PE32
49->100
dropped
file13
signatures14
process15
file16
102
C:\Users\user\AppData\Local\...coCraft.scr, PE32
57->102
dropped
104
C:\Users\user\AppData\Local\...coCraft.js, ASCII
57->104
dropped
188
Drops PE files with
a suspicious file extension
57->188
67
cmd.exe
57->67
started
70
cmd.exe
57->70
started
signatures17
process18
file19
78
C:\Users\user\AppData\...coCraft.url, MS
67->78
dropped
72
conhost.exe
67->72
started
74
conhost.exe
70->74
started
76
schtasks.exe
70->76
started
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://185.215.113.16/soka/random.exe