Threat name:
LummaC, Amadey, Credential Flusher, Lumm
Alert
Classification:
phis.troj.adwa.spyw.expl.evad
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the startup folder
Drops PE files to the user root directory
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites Mozilla Firefox settings
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected Credential Flusher
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1581276
Sample:
5uVReRlvME.exe
Startdate:
27/12/2024
Architecture:
WINDOWS
Score:
100
136
Found malware configuration
2->136
138
Malicious sample detected
(through community Yara
rule)
2->138
140
Antivirus detection
for URL or domain
2->140
142
27 other signatures
2->142
8
skotes.exe
4
64
2->8
started
13
5uVReRlvME.exe
5
2->13
started
15
c36de44bba.exe
2->15
started
17
7 other processes
2->17
process3
dnsIp4
110
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
8->110
112
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
8->112
118
3 other IPs or domains
8->118
78
C:\Users\user\AppData\...\a0f4fa9b49.exe, PE32
8->78
dropped
80
C:\Users\user\AppData\...\1b18db46b2.exe, PE32
8->80
dropped
82
C:\Users\user\AppData\...\20da271f67.exe, PE32
8->82
dropped
88
23 other malicious files
8->88
dropped
192
Creates multiple autostart
registry keys
8->192
194
Hides threads from debuggers
8->194
196
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
8->196
19
20da271f67.exe
8->19
started
24
557d4db723.exe
8->24
started
26
a0f4fa9b49.exe
8->26
started
30
10 other processes
8->30
84
C:\Users\user\AppData\Local\...\skotes.exe, PE32
13->84
dropped
86
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
13->86
dropped
198
Detected unpacking (changes
PE section rights)
13->198
200
Tries to evade debugger
and weak emulator (self
modifying code)
13->200
202
Tries to detect virtualization
through RDTSC time measurements
13->202
28
skotes.exe
13->28
started
204
Query firmware table
information (likely
to detect VMs)
15->204
206
Tries to harvest and
steal ftp login credentials
15->206
208
Tries to harvest and
steal browser information
(history, passwords,
etc)
15->208
210
Tries to steal Crypto
Currency Wallets
15->210
114
23.218.208.109
AS6453US
United States
17->114
116
127.0.0.1
unknown
unknown
17->116
212
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->212
file5
signatures6
process7
dnsIp8
102
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
19->102
60
C:\Users\user\AppData\...\mozglue[1].dll, PE32
19->60
dropped
62
C:\Users\user\AppData\...\freebl3[1].dll, PE32
19->62
dropped
74
4 other files (2 malicious)
19->74
dropped
166
Detected unpacking (changes
PE section rights)
19->166
168
Attempt to bypass Chrome
Application-Bound Encryption
19->168
170
Tries to steal Mail
credentials (via file
/ registry access)
19->170
184
8 other signatures
19->184
32
chrome.exe
19->32
started
64
C:\Users\user\AppData\...\soonmaintain.exe, PE32+
24->64
dropped
66
C:\Users\user\AppData\...\soonmaiintain.exe, PE32
24->66
dropped
172
Multi AV Scanner detection
for dropped file
24->172
174
Creates multiple autostart
registry keys
24->174
35
soonmaintain.exe
24->35
started
176
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
26->176
186
4 other signatures
26->186
188
3 other signatures
28->188
104
185.156.73.23
RELDAS-NETRU
Russian Federation
30->104
106
5.101.3.217
PINDC-ASRU
Russian Federation
30->106
108
4 other IPs or domains
30->108
68
C:\...\gretsylgaw_638708682569357197.exe, PE32
30->68
dropped
70
gretsylgaw_638708682569357197.exe (copy), PE32
30->70
dropped
72
C:\Users\user\...\Bunifu_UI_v1.5.3.dll, PE32
30->72
dropped
76
2 other malicious files
30->76
dropped
178
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
30->178
180
Query firmware table
information (likely
to detect VMs)
30->180
182
Binary is likely a compiled
AutoIt script file
30->182
190
9 other signatures
30->190
38
a762d7e2e8.exe
30->38
started
40
idmans.exe
30->40
started
42
4c60777cc9.exe
30->42
started
44
10 other processes
30->44
file9
signatures10
process11
dnsIp12
90
239.255.255.250
unknown
Reserved
32->90
46
chrome.exe
32->46
started
144
Multi AV Scanner detection
for dropped file
35->144
146
Found many strings related
to Crypto-Wallets (likely
being stolen)
35->146
148
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
35->148
164
3 other signatures
35->164
49
InstallUtil.exe
35->49
started
92
172.67.209.202
CLOUDFLARENETUS
United States
38->92
150
Query firmware table
information (likely
to detect VMs)
38->150
152
Tries to steal Crypto
Currency Wallets
38->152
94
194.163.146.146
NEXINTO-DE
Germany
40->94
154
Antivirus detection
for dropped file
40->154
156
Machine Learning detection
for dropped file
40->156
96
172.67.197.192
CLOUDFLARENETUS
United States
42->96
98
104.21.112.1
CLOUDFLARENETUS
United States
44->98
100
23.55.153.106
AKAMAI-ASN1EU
United States
44->100
158
Hides threads from debuggers
44->158
160
Loading BitLocker PowerShell
Module
44->160
162
LummaC encrypted strings
found
44->162
52
conhost.exe
44->52
started
54
WmiPrvSE.exe
44->54
started
56
conhost.exe
44->56
started
58
5 other processes
44->58
signatures13
process14
dnsIp15
120
142.250.181.142
GOOGLEUS
United States
46->120
122
172.217.21.35
GOOGLEUS
United States
46->122
126
2 other IPs or domains
46->126
124
45.89.196.115
DEDIPATH-LLCUS
Russian Federation
49->124
128
Query firmware table
information (likely
to detect VMs)
49->128
130
Tries to harvest and
steal ftp login credentials
49->130
132
Tries to harvest and
steal browser information
(history, passwords,
etc)
49->132
134
Tries to steal Crypto
Currency Wallets
49->134
signatures16
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.