Threat name:
LummaC Stealer, PrivateLoader, RedLine,
Alert
Classification:
troj.spyw.evad
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check for running processes (XOR)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1350006
Sample:
8BPDMnnIXn.exe
Startdate:
29/11/2023
Architecture:
WINDOWS
Score:
100
161
pic.himanfast.com
2->161
163
ipinfo.io
2->163
211
Snort IDS alert for
network traffic
2->211
213
Found malware configuration
2->213
215
Malicious sample detected
(through community Yara
rule)
2->215
217
18 other signatures
2->217
13
8BPDMnnIXn.exe
1
4
2->13
started
16
XsdType.exe
2->16
started
19
svchost.exe
2->19
started
22
7 other processes
2->22
signatures3
process4
dnsIp5
141
C:\Users\user\AppData\Local\...\QC7zS97.exe, PE32
13->141
dropped
143
C:\Users\user\AppData\Local\...\5Ra4hX5.exe, PE32
13->143
dropped
24
QC7zS97.exe
1
4
13->24
started
195
Antivirus detection
for dropped file
16->195
197
Multi AV Scanner detection
for dropped file
16->197
199
Machine Learning detection
for dropped file
16->199
201
3 other signatures
16->201
28
XsdType.exe
16->28
started
165
127.0.0.1
unknown
unknown
19->165
30
WerFault.exe
22->30
started
file6
signatures7
process8
file9
133
C:\Users\user\AppData\Local\...\Ag5Kf42.exe, PE32
24->133
dropped
135
C:\Users\user\AppData\Local\...\4Ln970bI.exe, PE32
24->135
dropped
243
Antivirus detection
for dropped file
24->243
245
Multi AV Scanner detection
for dropped file
24->245
247
Binary is likely a compiled
AutoIt script file
24->247
249
Machine Learning detection
for dropped file
24->249
32
Ag5Kf42.exe
1
4
24->32
started
36
4Ln970bI.exe
24->36
started
251
Writes to foreign memory
regions
28->251
253
Modifies the context
of a thread in another
process (thread injection)
28->253
255
Sample uses process
hollowing technique
28->255
257
Injects a PE file into
a foreign processes
28->257
signatures10
process11
file12
119
C:\Users\user\AppData\Local\...\mJ1Bh27.exe, PE32
32->119
dropped
121
C:\Users\user\AppData\Local\...\3BE68NI.exe, PE32
32->121
dropped
203
Antivirus detection
for dropped file
32->203
205
Multi AV Scanner detection
for dropped file
32->205
207
Machine Learning detection
for dropped file
32->207
38
3BE68NI.exe
32->38
started
41
mJ1Bh27.exe
1
4
32->41
started
209
Binary is likely a compiled
AutoIt script file
36->209
44
chrome.exe
36->44
started
47
chrome.exe
36->47
started
49
chrome.exe
36->49
started
51
7 other processes
36->51
signatures13
process14
dnsIp15
219
Antivirus detection
for dropped file
38->219
221
Multi AV Scanner detection
for dropped file
38->221
223
Machine Learning detection
for dropped file
38->223
225
5 other signatures
38->225
53
explorer.exe
38->53
injected
137
C:\Users\user\AppData\Local\...\2fg7788.exe, PE32
41->137
dropped
139
C:\Users\user\AppData\Local\...\1Na94cR5.exe, PE32
41->139
dropped
58
1Na94cR5.exe
1
41->58
started
60
2fg7788.exe
1
41->60
started
193
239.255.255.250
unknown
Reserved
44->193
62
chrome.exe
44->62
started
64
chrome.exe
47->64
started
66
chrome.exe
49->66
started
68
chrome.exe
51->68
started
70
chrome.exe
51->70
started
72
5 other processes
51->72
file16
signatures17
process18
dnsIp19
173
185.196.8.238, 49798, 80
SIMPLECARRER2IT
Switzerland
53->173
175
5.42.65.80, 49802, 80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
53->175
181
2 other IPs or domains
53->181
125
C:\Users\user\AppData\Local\Temp65B.exe, PE32
53->125
dropped
127
C:\Users\user\AppData\Local\Temp\D6F9.exe, PE32
53->127
dropped
129
C:\Users\user\AppData\Local\Temp\CDD0.exe, PE32
53->129
dropped
131
4 other malicious files
53->131
dropped
227
System process connects
to network (likely due
to code injection or
exploit)
53->227
229
Benign windows process
drops PE files
53->229
74
84BD.exe
53->74
started
78
B10F.exe
53->78
started
81
8E15.exe
53->81
started
93
5 other processes
53->93
231
Multi AV Scanner detection
for dropped file
58->231
233
Machine Learning detection
for dropped file
58->233
235
Contains functionality
to inject code into
remote processes
58->235
83
AppLaunch.exe
11
508
58->83
started
85
AppLaunch.exe
58->85
started
87
conhost.exe
58->87
started
237
Writes to foreign memory
regions
60->237
239
Allocates memory in
foreign processes
60->239
241
Injects a PE file into
a foreign processes
60->241
89
AppLaunch.exe
5
60->89
started
91
conhost.exe
60->91
started
177
tpop-api.twitter.com
104.244.42.2, 443, 49744
TWITTERUS
United States
62->177
179
t.co
104.244.42.5, 443, 49746
TWITTERUS
United States
62->179
183
36 other IPs or domains
62->183
file20
signatures21
process22
dnsIp23
185
194.169.175.235, 42691, 49799
CLOUDCOMPUTINGDE
Germany
74->185
259
Antivirus detection
for dropped file
74->259
261
Multi AV Scanner detection
for dropped file
74->261
263
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
74->263
265
Tries to steal Crypto
Currency Wallets
74->265
145
C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32
78->145
dropped
147
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
78->147
dropped
149
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
78->149
dropped
159
2 other malicious files
78->159
dropped
267
Machine Learning detection
for dropped file
78->267
95
InstallSetup9.exe
78->95
started
279
2 other signatures
81->279
98
8E15.exe
81->98
started
187
194.49.94.152, 19053, 49704, 49706
EQUEST-ASNL
unknown
83->187
189
ipinfo.io
34.117.59.81, 443, 49705
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
83->189
151
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
83->151
dropped
153
C:\Users\user\AppData\...\FANBooster131.exe, PE32
83->153
dropped
155
C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32
83->155
dropped
157
C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32
83->157
dropped
269
Tries to steal Mail
credentials (via file
/ registry access)
83->269
281
6 other signatures
83->281
101
schtasks.exe
1
83->101
started
103
schtasks.exe
83->103
started
105
WerFault.exe
83->105
started
271
Contains functionality
to check for running
processes (XOR)
85->271
273
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
85->273
275
Found stalling execution
ending in API Sleep
call
85->275
283
3 other signatures
85->283
277
Found many strings related
to Crypto-Wallets (likely
being stolen)
89->277
107
chrome.exe
89->107
started
file24
signatures25
process26
dnsIp27
285
Multi AV Scanner detection
for dropped file
95->285
123
C:\Users\user\AppData\Local\...\XsdType.exe, PE32+
98->123
dropped
110
conhost.exe
101->110
started
112
Conhost.exe
101->112
started
114
conhost.exe
103->114
started
191
192.168.2.5, 19053, 42691, 443
unknown
unknown
107->191
287
Found many strings related
to Crypto-Wallets (likely
being stolen)
107->287
116
chrome.exe
107->116
started
file28
signatures29
process30
dnsIp31
167
142.251.163.84, 443, 49784
GOOGLEUS
United States
116->167
169
plus.l.google.com
172.253.62.100, 443, 49796
GOOGLEUS
United States
116->169
171
6 other IPs or domains
116->171
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.