Threat name:
LummaC, Amadey, PureLog Stealer, RedLine
Alert
Classification:
phis.troj.adwa.spyw.evad.mine
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates multiple autostart registry keys
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1386374
Sample:
file.exe
Startdate:
04/02/2024
Architecture:
WINDOWS
Score:
100
124
modestessayevenmilwek.shop
2->124
126
mealroomrallpassiveer.shop
2->126
128
16 other IPs or domains
2->128
182
Snort IDS alert for
network traffic
2->182
184
Multi AV Scanner detection
for domain / URL
2->184
186
Found malware configuration
2->186
188
28 other signatures
2->188
10
explorgu.exe
2
72
2->10
started
15
MPGPH131.exe
2->15
started
17
file.exe
5
2->17
started
19
6 other processes
2->19
signatures3
process4
dnsIp5
154
185.215.113.32
WHOLESALECONNECTIONSNL
Portugal
10->154
156
109.107.182.3
TELEPORT-TV-ASRU
Russian Federation
10->156
160
2 other IPs or domains
10->160
108
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
10->108
dropped
110
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
10->110
dropped
112
C:\Users\user\AppData\Local\...\leg221.exe, PE32
10->112
dropped
118
39 other malicious files
10->118
dropped
228
Multi AV Scanner detection
for dropped file
10->228
230
Detected unpacking (changes
PE section rights)
10->230
232
Creates multiple autostart
registry keys
10->232
21
plaza.exe
3
112
10->21
started
26
ladas.exe
10->26
started
28
alex.exe
10->28
started
30
6 other processes
10->30
234
Tries to steal Mail
credentials (via file
/ registry access)
15->234
236
Machine Learning detection
for dropped file
15->236
238
Found many strings related
to Crypto-Wallets (likely
being stolen)
15->238
114
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
17->114
dropped
240
Hides threads from debuggers
17->240
158
127.0.0.1
unknown
unknown
19->158
116
C:\Users\user\AppData\Local\...\Login Data, SQLite
19->116
dropped
242
Tries to harvest and
steal browser information
(history, passwords,
etc)
19->242
file6
signatures7
process8
dnsIp9
138
193.233.132.62
FREE-NET-ASFREEnetEU
Russian Federation
21->138
140
ipinfo.io
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
21->140
88
C:\Users\user\...\dsIGuPm2titJRYSizKGS.exe, PE32
21->88
dropped
90
C:\Users\user\...\MAylgPki71nA6Xmgz0gj.exe, PE32
21->90
dropped
92
C:\Users\user\...\579wWVpMIw0nP7GrXcQI.exe, PE32
21->92
dropped
100
11 other malicious files
21->100
dropped
190
Detected unpacking (changes
PE section rights)
21->190
192
Binary is likely a compiled
AutoIt script file
21->192
194
Tries to steal Mail
credentials (via file
/ registry access)
21->194
210
4 other signatures
21->210
32
MAylgPki71nA6Xmgz0gj.exe
21->32
started
35
dsIGuPm2titJRYSizKGS.exe
21->35
started
37
579wWVpMIw0nP7GrXcQI.exe
21->37
started
48
4 other processes
21->48
94
C:\Users\user\...\RNBduntOMpdttdS8ghSD.exe, PE32
26->94
dropped
96
C:\Users\user\...\J4dmbWvQ6xbLLhIYARpi.exe, PE32
26->96
dropped
98
C:\Users\user\...Ewv3pMCROKrOgwBl0KJ.exe, PE32
26->98
dropped
102
6 other malicious files
26->102
dropped
196
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
26->196
212
5 other signatures
26->212
39
EEwv3pMCROKrOgwBl0KJ.exe
26->39
started
198
Multi AV Scanner detection
for dropped file
28->198
200
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
28->200
214
3 other signatures
28->214
41
RegAsm.exe
28->41
started
142
45.15.156.209
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
30->142
144
claimconcessionrebe.shop
104.21.58.31
CLOUDFLARENETUS
United States
30->144
146
5 other IPs or domains
30->146
202
System process connects
to network (likely due
to code injection or
exploit)
30->202
204
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
30->204
206
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
30->206
208
LummaC encrypted strings
found
30->208
44
rundll32.exe
23
30->44
started
46
conhost.exe
30->46
started
file10
signatures11
process12
file13
162
Detected unpacking (changes
PE section rights)
32->162
164
Detected unpacking (overwrites
its own PE header)
32->164
166
Modifies windows update
settings
32->166
178
3 other signatures
32->178
168
Binary is likely a compiled
AutoIt script file
35->168
50
chrome.exe
35->50
started
53
chrome.exe
35->53
started
55
chrome.exe
35->55
started
67
8 other processes
35->67
170
Hides threads from debuggers
37->170
104
C:\Users\user\AppData\Roaming\...\olehps.exe, PE32
41->104
dropped
106
C:\Users\user\AppData\Roaming\...\Logs.exe, PE32
41->106
dropped
57
olehps.exe
41->57
started
60
Logs.exe
41->60
started
172
Tries to steal Instant
Messenger accounts or
passwords
44->172
174
Uses netsh to modify
the Windows network
and firewall settings
44->174
176
Tries to harvest and
steal ftp login credentials
44->176
180
2 other signatures
44->180
63
powershell.exe
44->63
started
65
netsh.exe
2
44->65
started
69
3 other processes
48->69
signatures14
process15
dnsIp16
130
192.168.2.4
unknown
unknown
50->130
132
239.255.255.250
unknown
Reserved
50->132
71
chrome.exe
50->71
started
74
chrome.exe
53->74
started
76
chrome.exe
55->76
started
134
185.172.128.33
NADYMSS-ASRU
Russian Federation
57->134
216
Multi AV Scanner detection
for dropped file
57->216
218
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
57->218
220
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
57->220
226
2 other signatures
57->226
136
5.42.65.31
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
60->136
120
C:\Users\user\AppData\Roaming\...\qemu-ga.exe, PE32
60->120
dropped
222
Drops PE files to the
startup folder
60->222
122
C:\Users\user\...\246122658369_Desktop.zip, Zip
63->122
dropped
224
Found many strings related
to Crypto-Wallets (likely
being stolen)
63->224
78
conhost.exe
63->78
started
80
conhost.exe
65->80
started
82
msedge.exe
67->82
started
84
msedge.exe
67->84
started
86
msedge.exe
67->86
started
file17
signatures18
process19
dnsIp20
148
www.google.com
142.250.105.104
GOOGLEUS
United States
71->148
150
clients.l.google.com
142.250.105.138
GOOGLEUS
United States
71->150
152
8 other IPs or domains
71->152
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.