Threat name:
LummaC, Python Stealer, Amadey, LummaC S
Alert
Classification:
troj.spyw.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Detected generic credential text file
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Gathers network related connection and port information
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Generic Python Stealer
Yara detected LummaC Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1457690
Sample:
4TzzRzv0Hs.exe
Startdate:
15/06/2024
Architecture:
WINDOWS
Score:
100
173
Multi AV Scanner detection
for domain / URL
2->173
175
Found malware configuration
2->175
177
Malicious sample detected
(through community Yara
rule)
2->177
179
21 other signatures
2->179
10
axplong.exe
37
2->10
started
15
4TzzRzv0Hs.exe
5
2->15
started
17
svchost.exe
2->17
started
process3
dnsIp4
165
185.172.128.19
NADYMSS-ASRU
Russian Federation
10->165
167
77.91.77.81
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
10->167
135
C:\Users\user\AppData\Local\...135ewKindR.exe, PE32
10->135
dropped
137
C:\Users\user\AppData\...\drivermanager.exe, PE32
10->137
dropped
139
C:\Users\user\AppData\Local\...\lummac2.exe, PE32
10->139
dropped
145
13 other malicious files
10->145
dropped
239
Detected unpacking (changes
PE section rights)
10->239
241
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
10->241
243
Tries to evade debugger
and weak emulator (self
modifying code)
10->243
251
2 other signatures
10->251
19
judit.exe
47
10->19
started
23
setup222.exe
10->23
started
26
upd.exe
10->26
started
30
5 other processes
10->30
141
C:\Users\user\AppData\Local\...\axplong.exe, PE32
15->141
dropped
143
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
15->143
dropped
245
Tries to detect virtualization
through RDTSC time measurements
15->245
247
Hides threads from debuggers
15->247
249
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
15->249
28
axplong.exe
15->28
started
169
184.28.90.27
AKAMAI-ASUS
United States
17->169
file5
signatures6
process7
dnsIp8
111
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
19->111
dropped
113
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
19->113
dropped
115
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
19->115
dropped
125
32 other files (31 malicious)
19->125
dropped
207
Found many strings related
to Crypto-Wallets (likely
being stolen)
19->207
209
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
19->209
32
stub.exe
28
19->32
started
37
WmiPrvSE.exe
19->37
started
157
172.67.198.131
CLOUDFLARENETUS
United States
23->157
117
C:\Windows\System32\SetupWizard.exe, PE32+
23->117
dropped
127
21 other malicious files
23->127
dropped
211
Drops executables to
the windows directory
(C:\Windows) and
starts them
23->211
39
SetupWizard.exe
23->39
started
213
Writes to foreign memory
regions
26->213
215
Allocates memory in
foreign processes
26->215
217
Injects a PE file into
a foreign processes
26->217
41
RegAsm.exe
26->41
started
219
Hides threads from debuggers
28->219
221
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
28->221
223
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
28->223
159
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
30->159
161
18.66.107.48
MIT-GATEWAYSUS
United States
30->161
163
31.31.198.35
AS-REGRU
Russian Federation
30->163
119
C:\Users\user\AppData\Local\Temp\12.exe, PE32
30->119
dropped
121
C:\Users\user\AppData\Local\...\setup.exe, PE32
30->121
dropped
123
C:\Users\user\AppData\Local\...\setup[1].exe, PE32
30->123
dropped
225
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
30->225
227
Creates an undocumented
autostart registry key
30->227
229
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
30->229
231
3 other signatures
30->231
43
MSBuild.exe
30->43
started
45
RegAsm.exe
30->45
started
47
schtasks.exe
30->47
started
49
Conhost.exe
30->49
started
file9
signatures10
process11
dnsIp12
147
208.95.112.1
TUT-ASUS
United States
32->147
149
185.199.111.133
FASTLYUS
Netherlands
32->149
155
2 other IPs or domains
32->155
97
C:\Users\user\AppData\Local\...\Monster.exe, PE32+
32->97
dropped
99
C:\Users\user\AppData\...\system_info.txt, Algol
32->99
dropped
101
C:\Users\user\AppData\...\process_info.txt, ASCII
32->101
dropped
109
3 other malicious files
32->109
dropped
181
Found many strings related
to Crypto-Wallets (likely
being stolen)
32->181
183
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
32->183
185
Tries to harvest and
steal browser information
(history, passwords,
etc)
32->185
197
5 other signatures
32->197
51
cmd.exe
32->51
started
54
cmd.exe
32->54
started
56
cmd.exe
32->56
started
68
9 other processes
32->68
103
C:\Users\user\AppData\...\SetupWizard.exe, PE32+
39->103
dropped
58
SetupWizard.exe
39->58
started
105
C:\Users\user\AppData\Roaming\...\svhoost.exe, PE32
41->105
dropped
107
C:\Users\user\AppData\Roaming\...\One.exe, PE32
41->107
dropped
187
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
41->187
189
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
41->189
61
svhoost.exe
41->61
started
64
One.exe
41->64
started
151
104.21.91.177
CLOUDFLARENETUS
United States
43->151
191
Query firmware table
information (likely
to detect VMs)
43->191
193
Tries to harvest and
steal ftp login credentials
43->193
195
Tries to steal Crypto
Currency Wallets
43->195
153
4.185.27.237
LEVEL3US
United States
45->153
66
conhost.exe
47->66
started
file13
signatures14
process15
dnsIp16
199
Uses netsh to modify
the Windows network
and firewall settings
51->199
201
Tries to harvest and
steal WLAN passwords
51->201
203
Uses attrib.exe to hide
files
51->203
70
conhost.exe
51->70
started
72
systeminfo.exe
54->72
started
85
6 other processes
54->85
75
WMIC.exe
56->75
started
77
conhost.exe
56->77
started
129
C:\Windows\system32\winsvc.exe (copy), PE32+
58->129
dropped
131
C:\Windows\system32\.co4E3.tmp (copy), PE32+
58->131
dropped
133
C:\Windows\System32\.co4E3.tmp, PE32+
58->133
dropped
171
185.172.128.33
NADYMSS-ASRU
Russian Federation
61->171
205
Installs new ROOT certificates
61->205
79
conhost.exe
64->79
started
81
powershell.exe
68->81
started
83
tasklist.exe
68->83
started
87
15 other processes
68->87
file17
signatures18
process19
signatures20
233
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
72->233
235
Queries sensitive service
information (via WMI,
Win32_LogicalDisk, often
done to detect sandboxes)
75->235
237
Installs new ROOT certificates
81->237
89
Conhost.exe
83->89
started
91
net1.exe
85->91
started
93
quser.exe
85->93
started
95
net1.exe
85->95
started
process21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://77.91.77.82/soka/random.exe