Threat name:
LummaC, Amadey, LummaC Stealer, PureLog
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1414419
Sample:
a5PfQvvi4y.exe
Startdate:
23/03/2024
Architecture:
WINDOWS
Score:
100
147
Found malware configuration
2->147
149
Malicious sample detected
(through community Yara
rule)
2->149
151
Antivirus detection
for dropped file
2->151
153
22 other signatures
2->153
9
explorgu.exe
2
52
2->9
started
14
RageMP131.exe
2->14
started
16
random.exe
2->16
started
18
6 other processes
2->18
process3
dnsIp4
133
185.215.113.32
WHOLESALECONNECTIONSNL
Portugal
9->133
135
91.215.85.131
PINDC-ASRU
Russian Federation
9->135
141
2 other IPs or domains
9->141
103
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
9->103
dropped
105
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
9->105
dropped
113
25 other malicious files
9->113
dropped
207
Detected unpacking (changes
PE section rights)
9->207
209
Creates multiple autostart
registry keys
9->209
211
Tries to evade debugger
and weak emulator (self
modifying code)
9->211
229
3 other signatures
9->229
20
random.exe
9->20
started
25
amadka.exe
9->25
started
27
alex1234.exe
9->27
started
35
6 other processes
9->35
107
C:\Users\user\...\ZHNtmnRo_uPGNIQcD2wJ.exe, PE32
14->107
dropped
109
C:\Users\user\...\XYwGD9KQZlCKLmW6iD4B.exe, PE32
14->109
dropped
111
C:\Users\user\...\XIazk6MIpEKXhHCkbXOS.exe, PE32
14->111
dropped
115
13 other malicious files
14->115
dropped
213
Binary is likely a compiled
AutoIt script file
14->213
215
Tries to steal Mail
credentials (via file
/ registry access)
14->215
217
Tries to harvest and
steal browser information
(history, passwords,
etc)
14->217
29
XIazk6MIpEKXhHCkbXOS.exe
14->29
started
31
schtasks.exe
14->31
started
33
schtasks.exe
14->33
started
117
7 other malicious files
16->117
dropped
219
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
16->219
137
23.51.58.94
TMNET-AS-APTMNetInternetServiceProviderMY
United States
18->137
139
127.0.0.1
unknown
unknown
18->139
119
6 other malicious files
18->119
dropped
221
Multi AV Scanner detection
for dropped file
18->221
223
Machine Learning detection
for dropped file
18->223
225
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
18->225
227
Tries to detect virtualization
through RDTSC time measurements
18->227
file5
signatures6
process7
dnsIp8
121
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
20->121
123
104.26.4.15
CLOUDFLARENETUS
United States
20->123
81
C:\Users\user\...\SCiWfql4D0bS8GIpX0j8.exe, PE32
20->81
dropped
83
C:\Users\user\...\Hkb7jHst54ejrV_vyreN.exe, PE32
20->83
dropped
85
C:\Users\user\...\8_zVpIApigyDjiDQgztq.exe, PE32
20->85
dropped
89
6 other malicious files
20->89
dropped
155
Detected unpacking (changes
PE section rights)
20->155
157
Binary is likely a compiled
AutoIt script file
20->157
159
Tries to steal Mail
credentials (via file
/ registry access)
20->159
175
2 other signatures
20->175
54
2 other processes
20->54
87
C:\Users\user\AppData\Local\...\explorha.exe, PE32
25->87
dropped
161
Tries to evade debugger
and weak emulator (self
modifying code)
25->161
177
3 other signatures
25->177
37
explorha.exe
25->37
started
163
Writes to foreign memory
regions
27->163
165
Allocates memory in
foreign processes
27->165
167
Injects a PE file into
a foreign processes
27->167
42
RegAsm.exe
27->42
started
44
conhost.exe
27->44
started
46
conhost.exe
31->46
started
48
conhost.exe
33->48
started
125
217.195.207.156
ASFIBERSUNUCUTR
Turkey
35->125
169
System process connects
to network (likely due
to code injection or
exploit)
35->169
171
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
35->171
173
Found many strings related
to Crypto-Wallets (likely
being stolen)
35->173
179
9 other signatures
35->179
50
rundll32.exe
23
35->50
started
52
RegAsm.exe
35->52
started
56
9 other processes
35->56
file9
signatures10
process11
dnsIp12
127
193.233.132.56
FREE-NET-ASFREEnetEU
Russian Federation
37->127
91
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
37->91
dropped
93
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
37->93
dropped
95
C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+
37->95
dropped
97
C:\Users\user\AppData\Local\...\clip64[1].dll, PE32
37->97
dropped
181
Detected unpacking (changes
PE section rights)
37->181
183
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
37->183
205
4 other signatures
37->205
99
C:\Users\user\AppData\Roaming\...\propro.exe, PE32
42->99
dropped
101
C:\Users\user\AppData\Roaming\...\Traffic.exe, PE32
42->101
dropped
58
propro.exe
42->58
started
62
Traffic.exe
42->62
started
185
Tries to steal Instant
Messenger accounts or
passwords
50->185
187
Uses netsh to modify
the Windows network
and firewall settings
50->187
189
Tries to harvest and
steal ftp login credentials
50->189
191
Tries to harvest and
steal WLAN passwords
50->191
64
powershell.exe
50->64
started
67
netsh.exe
2
50->67
started
129
172.67.217.100
CLOUDFLARENETUS
United States
52->129
193
Query firmware table
information (likely
to detect VMs)
52->193
195
Found many strings related
to Crypto-Wallets (likely
being stolen)
52->195
197
Tries to harvest and
steal browser information
(history, passwords,
etc)
52->197
69
conhost.exe
54->69
started
71
conhost.exe
54->71
started
131
4.185.137.132
LEVEL3US
United States
56->131
199
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
56->199
201
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
56->201
203
Tries to steal Crypto
Currency Wallets
56->203
file13
signatures14
process15
dnsIp16
143
185.172.128.33
NADYMSS-ASRU
Russian Federation
58->143
231
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
58->231
233
Installs new ROOT certificates
58->233
235
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
58->235
237
Tries to harvest and
steal browser information
(history, passwords,
etc)
58->237
145
5.42.65.67
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
62->145
239
Tries to steal Crypto
Currency Wallets
62->239
241
Reads the System eventlog
62->241
73
conhost.exe
62->73
started
79
C:\Users\user\...\246122658369_Desktop.zip, Zip
64->79
dropped
75
conhost.exe
64->75
started
77
conhost.exe
67->77
started
file17
signatures18
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.