Threat name:
LummaC, Python Stealer, Amadey, LummaC S
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found C&C like URL pattern
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Opens the same file many times (likely Sandbox evasion)
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Generic Python Stealer
Yara detected LummaC Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1404838
Sample:
uBhJLQ37k8.exe
Startdate:
07/03/2024
Architecture:
WINDOWS
Score:
100
137
trecube.com
2->137
139
resergvearyinitiani.shop
2->139
141
11 other IPs or domains
2->141
169
Snort IDS alert for
network traffic
2->169
171
Found malware configuration
2->171
173
Malicious sample detected
(through community Yara
rule)
2->173
175
29 other signatures
2->175
11
explorgu.exe
1
63
2->11
started
16
chrosha.exe
2->16
started
18
uBhJLQ37k8.exe
5
2->18
started
20
newsun.exe
2->20
started
signatures3
process4
dnsIp5
157
185.215.113.32, 49741, 49742, 49744
WHOLESALECONNECTIONSNL
Portugal
11->157
159
185.172.128.19
NADYMSS-ASRU
Russian Federation
11->159
161
3 other IPs or domains
11->161
119
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
11->119
dropped
121
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
11->121
dropped
123
C:\Users\user\AppData\Local\...\amadka.exe, PE32
11->123
dropped
133
29 other malicious files
11->133
dropped
227
Antivirus detection
for dropped file
11->227
229
Detected unpacking (changes
PE section rights)
11->229
231
Machine Learning detection
for dropped file
11->231
243
3 other signatures
11->243
22
judith.exe
11->22
started
26
osminog.exe
2
11->26
started
28
swizzyy.exe
11->28
started
37
7 other processes
11->37
125
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
16->125
dropped
127
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
16->127
dropped
129
C:\Users\user\AppData\Local\...\random.exe, PE32
16->129
dropped
135
3 other malicious files
16->135
dropped
233
Multi AV Scanner detection
for dropped file
16->233
235
Creates multiple autostart
registry keys
16->235
30
random.exe
16->30
started
33
rundll32.exe
16->33
started
35
rundll32.exe
16->35
started
131
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
18->131
dropped
237
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
18->237
239
Tries to evade debugger
and weak emulator (self
modifying code)
18->239
241
Tries to detect virtualization
through RDTSC time measurements
18->241
file6
signatures7
process8
dnsIp9
99
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
22->99
dropped
101
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
22->101
dropped
103
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
22->103
dropped
111
32 other files (31 malicious)
22->111
dropped
177
Multi AV Scanner detection
for dropped file
22->177
179
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
22->179
39
stub.exe
22->39
started
181
Contains functionality
to inject code into
remote processes
26->181
183
Writes to foreign memory
regions
26->183
197
2 other signatures
26->197
44
RegAsm.exe
26->44
started
54
2 other processes
26->54
199
2 other signatures
28->199
46
RegAsm.exe
28->46
started
56
2 other processes
28->56
163
ipinfo.io
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
30->163
165
193.233.132.62
FREE-NET-ASFREEnetEU
Russian Federation
30->165
167
db-ip.com
172.67.75.166
CLOUDFLARENETUS
United States
30->167
105
C:\Users\user\AppData\Local\...\RageMP131.exe, PE32
30->105
dropped
107
C:\ProgramData\MPGPH131\MPGPH131.exe, PE32
30->107
dropped
185
Detected unpacking (changes
PE section rights)
30->185
187
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
30->187
189
Creates multiple autostart
registry keys
30->189
201
4 other signatures
30->201
48
rundll32.exe
33->48
started
191
System process connects
to network (likely due
to code injection or
exploit)
35->191
109
C:\Users\user\AppData\Local\...\chrosha.exe, PE32
37->109
dropped
193
Creates an undocumented
autostart registry key
37->193
195
Uses schtasks.exe or
at.exe to add and modify
task schedules
37->195
50
rundll32.exe
23
37->50
started
52
RegAsm.exe
37->52
started
58
4 other processes
37->58
file10
signatures11
process12
dnsIp13
143
raw.githubusercontent.com
185.199.111.133
FASTLYUS
Netherlands
39->143
155
2 other IPs or domains
39->155
115
C:\Users\user\AppData\Local\...\Monster.exe, PE32+
39->115
dropped
117
C:\Users\user\AppData\...\system_info.txt, Algol
39->117
dropped
203
Multi AV Scanner detection
for dropped file
39->203
205
Tries to harvest and
steal browser information
(history, passwords,
etc)
39->205
207
Tries to steal Crypto
Currency Wallets
39->207
60
cmd.exe
39->60
started
62
cmd.exe
39->62
started
64
cmd.exe
39->64
started
77
12 other processes
39->77
145
resergvearyinitiani.shop
104.21.94.2, 443, 49746, 49749
CLOUDFLARENETUS
United States
44->145
209
Query firmware table
information (likely
to detect VMs)
44->209
211
Found many strings related
to Crypto-Wallets (likely
being stolen)
44->211
147
trecube.com
104.21.35.168
CLOUDFLARENETUS
United States
46->147
149
ip-api.com
208.95.112.1
TUT-ASUS
United States
46->149
213
Tries to steal Instant
Messenger accounts or
passwords
48->213
215
Tries to harvest and
steal ftp login credentials
48->215
217
Tries to harvest and
steal WLAN passwords
48->217
66
netsh.exe
48->66
started
68
powershell.exe
48->68
started
219
Uses netsh to modify
the Windows network
and firewall settings
50->219
70
powershell.exe
50->70
started
73
netsh.exe
50->73
started
151
executivebrakeji.shop
104.21.69.250
CLOUDFLARENETUS
United States
52->151
221
Opens the same file
many times (likely Sandbox
evasion)
52->221
223
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
54->223
225
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
54->225
153
20.218.68.91
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
58->153
75
conhost.exe
58->75
started
file14
signatures15
process16
file17
79
conhost.exe
60->79
started
81
tasklist.exe
60->81
started
91
2 other processes
62->91
93
2 other processes
64->93
83
conhost.exe
66->83
started
85
conhost.exe
68->85
started
113
C:\Users\user\...\246122658369_Desktop.zip, Zip
70->113
dropped
87
conhost.exe
70->87
started
89
conhost.exe
73->89
started
95
22 other processes
77->95
process18
process19
97
Conhost.exe
79->97
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.