Threat name:
LummaC, Python Stealer, Amadey, LummaC S
Alert
Classification:
troj.spyw.evad.mine
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected generic credential text file
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Powershell downloading file from url shortener site
Sigma detected: Silenttrinity Stager Msbuild Activity
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Generic Python Stealer
Yara detected LummaC Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1460973
Sample:
setup.exe
Startdate:
22/06/2024
Architecture:
WINDOWS
Score:
100
124
willingyhollowsk.shop
2->124
126
pool.supportxmr.com
2->126
128
15 other IPs or domains
2->128
156
Snort IDS alert for
network traffic
2->156
158
Found malware configuration
2->158
160
Malicious sample detected
(through community Yara
rule)
2->160
162
28 other signatures
2->162
13
setup.exe
5
2->13
started
17
axplong.exe
2->17
started
19
Hkbsse.exe
2->19
started
21
2 other processes
2->21
signatures3
process4
file5
120
C:\Users\user\AppData\Local\...\axplong.exe, PE32
13->120
dropped
122
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
13->122
dropped
232
Detected unpacking (changes
PE section rights)
13->232
234
Tries to evade debugger
and weak emulator (self
modifying code)
13->234
236
Tries to detect virtualization
through RDTSC time measurements
13->236
23
axplong.exe
46
13->23
started
238
Hides threads from debuggers
17->238
240
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->240
242
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
17->242
signatures6
process7
dnsIp8
132
185.172.128.116
NADYMSS-ASRU
Russian Federation
23->132
134
77.91.77.81, 49705, 49706, 49708
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
23->134
136
3 other IPs or domains
23->136
82
C:\Users\user\AppData\Local\...\0x3fg.exe, PE32
23->82
dropped
84
C:\Users\user\AppData\Local\Temp\...\legs.exe, PE32
23->84
dropped
86
C:\Users\user\AppData\Local\...\Installer.exe, PE32+
23->86
dropped
88
19 other malicious files
23->88
dropped
164
Multi AV Scanner detection
for dropped file
23->164
166
Detected unpacking (changes
PE section rights)
23->166
168
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
23->168
170
5 other signatures
23->170
28
monster.exe
23->28
started
32
upd.exe
23->32
started
34
deep.exe
23->34
started
36
8 other processes
23->36
file9
signatures10
process11
dnsIp12
106
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
28->106
dropped
108
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
28->108
dropped
110
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
28->110
dropped
118
32 other files (31 malicious)
28->118
dropped
210
Multi AV Scanner detection
for dropped file
28->210
212
Machine Learning detection
for dropped file
28->212
214
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
28->214
39
stub.exe
28->39
started
216
Found many strings related
to Crypto-Wallets (likely
being stolen)
32->216
218
Contains functionality
to inject code into
remote processes
32->218
220
Writes to foreign memory
regions
32->220
228
2 other signatures
32->228
44
RegAsm.exe
4
32->44
started
112
C:\Users\user\AppData\...\da_protected.exe, PE32
34->112
dropped
46
da_protected.exe
34->46
started
130
185.215.113.67, 40960, 49707
WHOLESALECONNECTIONSNL
Portugal
36->130
114
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
36->114
dropped
116
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
36->116
dropped
222
Antivirus detection
for dropped file
36->222
224
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
36->224
226
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
36->226
230
2 other signatures
36->230
48
MSBuild.exe
36->48
started
50
cmd.exe
36->50
started
52
RegAsm.exe
36->52
started
54
9 other processes
36->54
file13
signatures14
process15
dnsIp16
138
ip-api.com
208.95.112.1
TUT-ASUS
United States
39->138
140
restores.name
65.0.21.192
AMAZON-02US
United States
39->140
142
127.0.0.1
unknown
unknown
39->142
90
C:\Users\user\AppData\Local\...\Monster.exe, PE32+
39->90
dropped
92
C:\Users\user\AppData\...\system_info.txt, Algol
39->92
dropped
94
C:\Users\user\AppData\...\process_info.txt, ASCII
39->94
dropped
104
3 other malicious files
39->104
dropped
172
Multi AV Scanner detection
for dropped file
39->172
174
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
39->174
192
2 other signatures
39->192
56
Conhost.exe
39->56
started
96
C:\Users\user\AppData\Roaming\...\svhoost.exe, PE32
44->96
dropped
98
C:\Users\user\AppData\Roaming\...\One.exe, PE32
44->98
dropped
176
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
44->176
178
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
44->178
58
svhoost.exe
44->58
started
62
One.exe
44->62
started
144
195.2.71.70
VDSINA-ASRU
Russian Federation
46->144
100
C:\Users\user\AppData\Local\Temp\qnesar.exe, PE32
46->100
dropped
102
C:\Users\user\AppData\Local\Temp\pemvnq.exe, PE32+
46->102
dropped
180
Detected unpacking (changes
PE section rights)
46->180
182
Query firmware table
information (likely
to detect VMs)
46->182
184
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
46->184
194
3 other signatures
46->194
146
willingyhollowsk.shop
104.21.91.177
CLOUDFLARENETUS
United States
48->146
186
Found many strings related
to Crypto-Wallets (likely
being stolen)
48->186
196
2 other signatures
48->196
188
Suspicious powershell
command line found
50->188
190
Uses schtasks.exe or
at.exe to add and modify
task schedules
50->190
64
powershell.exe
50->64
started
66
conhost.exe
50->66
started
68
schtasks.exe
50->68
started
70
schtasks.exe
50->70
started
148
4.185.27.237
LEVEL3US
United States
52->148
72
conhost.exe
54->72
started
74
Conhost.exe
54->74
started
file17
signatures18
process19
dnsIp20
150
185.172.128.33, 49709, 8970
NADYMSS-ASRU
Russian Federation
58->150
198
Multi AV Scanner detection
for dropped file
58->198
200
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
58->200
202
Installs new ROOT certificates
58->202
208
3 other signatures
58->208
204
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
62->204
206
Reads the System eventlog
62->206
76
conhost.exe
62->76
started
152
bit.ly
67.199.248.11
GOOGLE-PRIVATE-CLOUDUS
United States
64->152
154
pixel.com
54.67.42.145
AMAZON-02US
United States
64->154
signatures21
process22
process23
78
Conhost.exe
76->78
started
process24
80
Conhost.exe
78->80
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.