Threat name:
PureCrypter, LummaC, Amadey, LummaC Stea
Alert
Classification:
troj.spyw.evad
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected PureCrypter Trojan
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: MSHTA Suspicious Execution 01
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1554046
Sample:
file.exe
Startdate:
12/11/2024
Architecture:
WINDOWS
Score:
100
89
frogmen-smell.sbs
2->89
91
freewaylumma.online
2->91
93
11 other IPs or domains
2->93
123
Suricata IDS alerts
for network traffic
2->123
125
Found malware configuration
2->125
127
Malicious sample detected
(through community Yara
rule)
2->127
129
18 other signatures
2->129
9
skotes.exe
2->9
started
14
file.exe
37
2->14
started
16
4136f86ac7.exe
2->16
started
18
5 other processes
2->18
signatures3
process4
dnsIp5
109
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
9->109
111
freewaylumma.online
192.64.117.218
NAMECHEAP-NETUS
United States
9->111
113
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
9->113
67
C:\Users\user\AppData\...\0ac2a0f3ae.exe, PE32
9->67
dropped
69
C:\Users\user\AppData\...\3160604f40.exe, PE32
9->69
dropped
71
C:\Users\user\AppData\...\4136f86ac7.exe, PE32
9->71
dropped
79
5 other malicious files
9->79
dropped
173
Creates multiple autostart
registry keys
9->173
175
Hides threads from debuggers
9->175
177
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
9->177
20
4136f86ac7.exe
9->20
started
24
0ac2a0f3ae.exe
9->24
started
26
file1.exe
9->26
started
36
3 other processes
9->36
115
185.215.113.206, 49704, 49728, 49758
WHOLESALECONNECTIONSNL
Portugal
14->115
117
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
14->117
119
127.0.0.1
unknown
unknown
14->119
73
C:\Users\user\DocumentsECAFHIIJJE.exe, PE32
14->73
dropped
75
C:\Users\user\AppData\...\softokn3[1].dll, PE32
14->75
dropped
77
C:\Users\user\AppData\Local\...\random[1].exe, PE32
14->77
dropped
81
11 other files (3 malicious)
14->81
dropped
179
Detected unpacking (changes
PE section rights)
14->179
181
Attempt to bypass Chrome
Application-Bound Encryption
14->181
183
Drops PE files to the
document folder of the
user
14->183
195
7 other signatures
14->195
28
cmd.exe
14->28
started
30
msedge.exe
2
10
14->30
started
32
chrome.exe
8
14->32
started
121
23.197.127.21
AKAMAI-ASN1EU
United States
16->121
185
Query firmware table
information (likely
to detect VMs)
16->185
187
Tries to harvest and
steal ftp login credentials
16->187
189
Tries to harvest and
steal browser information
(history, passwords,
etc)
16->189
191
Bypasses PowerShell
execution policy
18->191
193
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
18->193
34
powershell.exe
18->34
started
39
5 other processes
18->39
file6
signatures7
process8
dnsIp9
105
2 other IPs or domains
20->105
131
Multi AV Scanner detection
for dropped file
20->131
133
Detected unpacking (changes
PE section rights)
20->133
135
Query firmware table
information (likely
to detect VMs)
20->135
149
3 other signatures
20->149
137
Modifies windows update
settings
24->137
139
Disables Windows Defender
Tamper protection
24->139
141
Tries to evade debugger
and weak emulator (self
modifying code)
24->141
151
2 other signatures
24->151
95
frogmen-smell.sbs
172.67.174.133
CLOUDFLARENETUS
United States
26->95
153
3 other signatures
26->153
41
DocumentsECAFHIIJJE.exe
28->41
started
45
conhost.exe
28->45
started
143
Monitors registry run
keys for changes
30->143
47
msedge.exe
30->47
started
97
192.168.2.5, 443, 49703, 49704
unknown
unknown
32->97
99
239.255.255.250
unknown
Reserved
32->99
49
chrome.exe
32->49
started
101
5.79.74.169
LEASEWEB-NL-AMS-01NetherlandsNL
Netherlands
34->101
145
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
34->145
52
conhost.exe
34->52
started
103
cl.oud-cdn.de
176.9.192.202
HETZNER-ASDE
Germany
36->103
59
C:\Users\user\AppData\...\ojHpUJVY3.ps1, ASCII
36->59
dropped
61
C:\Users\user\AppData\...\ojHpUJVY2.ps1, ASCII
36->61
dropped
147
Found suspicious powershell
code related to unpacking
or dynamic code loading
36->147
155
2 other signatures
36->155
54
conhost.exe
36->54
started
107
23 other IPs or domains
39->107
63
C:\Users\user\AppData\Local\...\Cookies, SQLite
39->63
dropped
file10
signatures11
process12
dnsIp13
65
C:\Users\user\AppData\Local\...\skotes.exe, PE32
41->65
dropped
165
Detected unpacking (changes
PE section rights)
41->165
167
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
41->167
169
Tries to evade debugger
and weak emulator (self
modifying code)
41->169
171
4 other signatures
41->171
56
skotes.exe
41->56
started
83
www.google.com
142.250.185.196, 443, 49706, 49707
GOOGLEUS
United States
49->83
85
play.google.com
142.250.186.110, 443, 49723, 49731
GOOGLEUS
United States
49->85
87
2 other IPs or domains
49->87
file14
signatures15
process16
signatures17
157
Detected unpacking (changes
PE section rights)
56->157
159
Creates HTML files with
.exe extension (expired
dropper behavior)
56->159
161
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
56->161
163
4 other signatures
56->163
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.