Threat name:
LummaC, Amadey, AsyncRAT, LummaC Stealer
Alert
Classification:
phis.troj.spyw.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1543487
Sample:
file.exe
Startdate:
28/10/2024
Architecture:
WINDOWS
Score:
100
84
seallysl.site
2->84
86
presticitpo.store
2->86
88
4 other IPs or domains
2->88
112
Suricata IDS alerts
for network traffic
2->112
114
Found malware configuration
2->114
116
Malicious sample detected
(through community Yara
rule)
2->116
118
25 other signatures
2->118
10
axplong.exe
2
28
2->10
started
15
file.exe
5
2->15
started
17
92631e0f61.exe
2->17
started
19
3 other processes
2->19
signatures3
process4
dnsIp5
94
185.215.113.16, 49945, 49961, 49981
WHOLESALECONNECTIONSNL
Portugal
10->94
96
185.215.113.217, 49967, 49983, 80
WHOLESALECONNECTIONSNL
Portugal
10->96
98
2 other IPs or domains
10->98
66
C:\Users\user\AppData\...\92631e0f61.exe, PE32
10->66
dropped
68
C:\Users\user\AppData\...\b57f23ae5f.exe, PE32
10->68
dropped
70
C:\Users\user\AppData\Local\...\crypted.exe, PE32
10->70
dropped
78
7 other malicious files
10->78
dropped
162
Creates multiple autostart
registry keys
10->162
164
Hides threads from debuggers
10->164
166
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->166
21
crypted.exe
10->21
started
24
92631e0f61.exe
10->24
started
27
rundll32.exe
10->27
started
31
2 other processes
10->31
72
C:\Users\user\AppData\Local\...\axplong.exe, PE32
15->72
dropped
74
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
15->74
dropped
168
Detected unpacking (changes
PE section rights)
15->168
170
Tries to evade debugger
and weak emulator (self
modifying code)
15->170
172
Tries to detect virtualization
through RDTSC time measurements
15->172
29
axplong.exe
15->29
started
76
C:\Users\user\...\KQUUUVCF9QPCKYTNQ.exe, PE32
17->76
dropped
174
Query firmware table
information (likely
to detect VMs)
17->174
176
Tries to harvest and
steal ftp login credentials
17->176
178
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->178
180
Tries to steal Crypto
Currency Wallets
19->180
182
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->182
file6
signatures7
process8
dnsIp9
136
Antivirus detection
for dropped file
21->136
138
Machine Learning detection
for dropped file
21->138
140
Injects a PE file into
a foreign processes
21->140
33
crypted.exe
21->33
started
38
conhost.exe
21->38
started
40
crypted.exe
21->40
started
90
crisiwarny.store
172.67.170.64
CLOUDFLARENETUS
United States
24->90
142
Multi AV Scanner detection
for dropped file
24->142
144
Detected unpacking (changes
PE section rights)
24->144
146
Query firmware table
information (likely
to detect VMs)
24->146
160
5 other signatures
24->160
42
rundll32.exe
23
27->42
started
148
Tries to evade debugger
and weak emulator (self
modifying code)
29->148
150
Hides threads from debuggers
29->150
152
Potentially malicious
time measurement code
found
29->152
92
185.215.113.206, 49993, 80
WHOLESALECONNECTIONSNL
Portugal
31->92
154
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
31->154
156
Writes to foreign memory
regions
31->156
158
Allocates memory in
foreign processes
31->158
44
MSBuild.exe
15
2
31->44
started
46
conhost.exe
31->46
started
signatures10
process11
dnsIp12
80
seallysl.site
172.67.180.76, 443, 49989, 49990
CLOUDFLARENETUS
United States
33->80
62
C:\...\4UPDJ9FOQC63JDOQ9YD1UMW3KXYL9RN.exe, PE32
33->62
dropped
120
Query firmware table
information (likely
to detect VMs)
33->120
122
Found many strings related
to Crypto-Wallets (likely
being stolen)
33->122
124
Tries to steal Crypto
Currency Wallets
33->124
48
4UPDJ9FOQC63JDOQ9YD1UMW3KXYL9RN.exe
33->48
started
126
System process connects
to network (likely due
to code injection or
exploit)
42->126
128
Tries to steal Instant
Messenger accounts or
passwords
42->128
130
Uses netsh to modify
the Windows network
and firewall settings
42->130
134
3 other signatures
42->134
51
powershell.exe
42->51
started
54
netsh.exe
42->54
started
82
ip-api.com
208.95.112.1, 49980, 80
TUT-ASUS
United States
44->82
132
Contains functionality
to check if a debugger
is running (CheckRemoteDebuggerPresent)
44->132
56
WerFault.exe
44->56
started
file13
signatures14
process15
file16
100
Multi AV Scanner detection
for dropped file
48->100
102
Detected unpacking (changes
PE section rights)
48->102
104
Machine Learning detection
for dropped file
48->104
110
7 other signatures
48->110
64
C:\Users\user\...\246122658369_Desktop.zip, Zip
51->64
dropped
106
Found many strings related
to Crypto-Wallets (likely
being stolen)
51->106
108
Loading BitLocker PowerShell
Module
51->108
58
conhost.exe
51->58
started
60
conhost.exe
54->60
started
signatures17
process18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.