Threat name:
LummaC, Amadey, Mars Stealer, PureLog St
Alert
Classification:
phis.troj.spyw.expl.evad
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Mars stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1437040
Sample:
8A1Qvcfs13.exe
Startdate:
06/05/2024
Architecture:
WINDOWS
Score:
100
195
Found malware configuration
2->195
197
Malicious sample detected
(through community Yara
rule)
2->197
199
Antivirus detection
for URL or domain
2->199
201
27 other signatures
2->201
12
8A1Qvcfs13.exe
5
2->12
started
16
MPGPH131.exe
2->16
started
19
248021f361.exe
2->19
started
21
8 other processes
2->21
process3
dnsIp4
125
C:\Users\user\AppData\Local\...\explorta.exe, PE32
12->125
dropped
275
Query firmware table
information (likely
to detect VMs)
12->275
277
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
12->277
23
explorta.exe
2
23
12->23
started
145
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
16->145
147
104.26.4.15
CLOUDFLARENETUS
United States
16->147
279
Multi AV Scanner detection
for dropped file
16->279
281
Tries to steal Mail
credentials (via file
/ registry access)
16->281
283
Machine Learning detection
for dropped file
16->283
127
C:\Users\user\...\MwX7M5ufg5mcz_DsC6La7ZH.zip, Zip
19->127
dropped
285
Tries to harvest and
steal browser information
(history, passwords,
etc)
19->285
149
20.190.157.11
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
21->149
151
195.181.163.195
CDN77GB
United Kingdom
21->151
153
2 other IPs or domains
21->153
129
SystemMechanic_548...38868BD1.exe (copy), PE32
21->129
dropped
131
C:\Users\user\AppData\Local\...\BIT4701.tmp, PE32
21->131
dropped
133
C:\Users\user\...\tAHfuoEutSEXIY4oZtlN3_V.zip, Zip
21->133
dropped
287
Benign windows process
drops PE files
21->287
28
WerFault.exe
21->28
started
30
WerFault.exe
21->30
started
32
WerFault.exe
21->32
started
file5
signatures6
process7
dnsIp8
157
193.233.132.56
FREE-NET-ASFREEnetEU
Russian Federation
23->157
159
193.233.132.139
FREE-NET-ASFREEnetEU
Russian Federation
23->159
115
C:\Users\user\AppData\...\248021f361.exe, PE32
23->115
dropped
117
C:\Users\user\AppData\Local\...\amert.exe, PE32
23->117
dropped
119
C:\Users\user\AppData\Local\...\sarra[1].exe, PE32
23->119
dropped
121
4 other malicious files
23->121
dropped
225
Multi AV Scanner detection
for dropped file
23->225
227
Query firmware table
information (likely
to detect VMs)
23->227
229
Creates multiple autostart
registry keys
23->229
231
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
23->231
34
amert.exe
4
23->34
started
38
248021f361.exe
23->38
started
41
929efe4a9c.exe
23->41
started
43
explorta.exe
23->43
started
161
20.189.173.20
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
28->161
file9
signatures10
process11
dnsIp12
107
C:\Users\user\AppData\Local\...\explorha.exe, PE32
34->107
dropped
203
Detected unpacking (changes
PE section rights)
34->203
205
Tries to evade debugger
and weak emulator (self
modifying code)
34->205
207
Tries to detect virtualization
through RDTSC time measurements
34->207
221
3 other signatures
34->221
45
explorha.exe
42
34->45
started
155
147.45.47.126
FREE-NET-ASFREEnetEU
Russian Federation
38->155
109
C:\Users\user\AppData\Local\...\RageMP131.exe, PE32
38->109
dropped
111
C:\ProgramData\MPGPH131\MPGPH131.exe, PE32
38->111
dropped
113
C:\Users\user\...\_pjxNwfMvBMBO2CXhc0Mt8L.zip, Zip
38->113
dropped
209
Multi AV Scanner detection
for dropped file
38->209
211
Query firmware table
information (likely
to detect VMs)
38->211
213
Tries to steal Mail
credentials (via file
/ registry access)
38->213
223
3 other signatures
38->223
50
schtasks.exe
38->50
started
52
schtasks.exe
38->52
started
215
Antivirus detection
for dropped file
41->215
217
Binary is likely a compiled
AutoIt script file
41->217
219
Machine Learning detection
for dropped file
41->219
54
chrome.exe
41->54
started
file13
signatures14
process15
dnsIp16
181
185.172.128.19
NADYMSS-ASRU
Russian Federation
45->181
183
77.221.151.47
INFOBOX-ASInfoboxruAutonomousSystemRU
Russian Federation
45->183
185
193.233.132.234
FREE-NET-ASFREEnetEU
Russian Federation
45->185
135
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
45->135
dropped
137
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
45->137
dropped
139
C:\Users\user\AppData\Local\Temp\...139ewB.exe, PE32
45->139
dropped
141
17 other malicious files
45->141
dropped
289
Detected unpacking (changes
PE section rights)
45->289
291
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
45->291
293
Tries to evade debugger
and weak emulator (self
modifying code)
45->293
295
3 other signatures
45->295
56
jok.exe
45->56
started
61
swiiiii.exe
45->61
started
63
gold.exe
45->63
started
73
4 other processes
45->73
65
conhost.exe
50->65
started
67
conhost.exe
52->67
started
187
192.168.2.5
unknown
unknown
54->187
189
239.255.255.250
unknown
Reserved
54->189
69
chrome.exe
54->69
started
71
chrome.exe
54->71
started
file17
signatures18
process19
dnsIp20
163
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
56->163
165
3.5.30.151
AMAZON-AESUS
United States
56->165
167
104.192.141.1
AMAZON-02US
United States
56->167
123
C:\Users\user\AppData\Local\Temp\enpl.exe, PE32
56->123
dropped
233
Multi AV Scanner detection
for dropped file
56->233
235
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
56->235
237
Installs new ROOT certificates
56->237
255
4 other signatures
56->255
239
Writes to foreign memory
regions
61->239
241
Allocates memory in
foreign processes
61->241
243
Injects a PE file into
a foreign processes
61->243
75
RegAsm.exe
61->75
started
79
WerFault.exe
61->79
started
81
conhost.exe
61->81
started
245
LummaC encrypted strings
found
63->245
83
RegAsm.exe
63->83
started
91
2 other processes
63->91
169
142.250.189.142
GOOGLEUS
United States
69->169
171
142.250.64.195
GOOGLEUS
United States
69->171
173
6 other IPs or domains
69->173
247
System process connects
to network (likely due
to code injection or
exploit)
73->247
249
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
73->249
251
Adds a directory exclusion
to Windows Defender
73->251
253
Disables UAC (registry)
73->253
85
rundll32.exe
73->85
started
87
powershell.exe
73->87
started
89
conhost.exe
73->89
started
93
2 other processes
73->93
file21
signatures22
process23
dnsIp24
175
172.67.181.34
CLOUDFLARENETUS
United States
75->175
257
Found many strings related
to Crypto-Wallets (likely
being stolen)
75->257
259
Tries to harvest and
steal browser information
(history, passwords,
etc)
75->259
261
Tries to steal Crypto
Currency Wallets
75->261
177
52.168.117.173
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
79->177
179
172.67.148.231
CLOUDFLARENETUS
United States
83->179
263
Query firmware table
information (likely
to detect VMs)
83->263
265
Tries to steal Instant
Messenger accounts or
passwords
85->265
267
Uses netsh to modify
the Windows network
and firewall settings
85->267
269
Tries to harvest and
steal ftp login credentials
85->269
271
Tries to harvest and
steal WLAN passwords
85->271
95
powershell.exe
85->95
started
99
netsh.exe
85->99
started
273
Loading BitLocker PowerShell
Module
87->273
101
conhost.exe
87->101
started
signatures25
process26
file27
143
C:\Users\user\...\246122658369_Desktop.zip, Zip
95->143
dropped
191
Installs new ROOT certificates
95->191
193
Loading BitLocker PowerShell
Module
95->193
103
conhost.exe
95->103
started
105
conhost.exe
99->105
started
signatures28
process29
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.