Threat name:
LummaC Stealer, PrivateLoader, RedLine,
Alert
Classification:
troj.spyw.evad
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check for running processes (XOR)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1349996
Sample:
yqTal6hJyA.exe
Startdate:
29/11/2023
Architecture:
WINDOWS
Score:
100
159
pic.himanfast.com
2->159
161
ipinfo.io
2->161
201
Snort IDS alert for
network traffic
2->201
203
Found malware configuration
2->203
205
Malicious sample detected
(through community Yara
rule)
2->205
207
19 other signatures
2->207
13
yqTal6hJyA.exe
1
4
2->13
started
16
XsdType.exe
2->16
started
19
OfficeTrackerNMP131.exe
2->19
started
21
6 other processes
2->21
signatures3
process4
dnsIp5
155
C:\Users\user\AppData\Local\...\sk2Qt47.exe, PE32
13->155
dropped
157
C:\Users\user\AppData\Local\...\5sD6MZ0.exe, PE32
13->157
dropped
24
sk2Qt47.exe
1
4
13->24
started
193
Antivirus detection
for dropped file
16->193
195
Multi AV Scanner detection
for dropped file
16->195
197
Machine Learning detection
for dropped file
16->197
199
3 other signatures
16->199
28
XsdType.exe
16->28
started
30
chrome.exe
19->30
started
169
127.0.0.1
unknown
unknown
21->169
32
WerFault.exe
21->32
started
file6
signatures7
process8
file9
139
C:\Users\user\AppData\Local\...\ck0rG18.exe, PE32
24->139
dropped
141
C:\Users\user\AppData\Local\...\4Ut221ym.exe, PE32
24->141
dropped
223
Antivirus detection
for dropped file
24->223
225
Binary is likely a compiled
AutoIt script file
24->225
227
Machine Learning detection
for dropped file
24->227
34
ck0rG18.exe
1
4
24->34
started
38
4Ut221ym.exe
24->38
started
229
Writes to foreign memory
regions
28->229
231
Modifies the context
of a thread in another
process (thread injection)
28->231
233
Sample uses process
hollowing technique
28->233
235
Injects a PE file into
a foreign processes
28->235
signatures10
process11
file12
119
C:\Users\user\AppData\Local\...\rq7SB75.exe, PE32
34->119
dropped
121
C:\Users\user\AppData\Local\...\3vO15kf.exe, PE32
34->121
dropped
209
Antivirus detection
for dropped file
34->209
211
Machine Learning detection
for dropped file
34->211
40
3vO15kf.exe
34->40
started
43
rq7SB75.exe
1
4
34->43
started
213
Binary is likely a compiled
AutoIt script file
38->213
46
chrome.exe
38->46
started
49
chrome.exe
38->49
started
51
chrome.exe
38->51
started
53
7 other processes
38->53
signatures13
process14
dnsIp15
215
Antivirus detection
for dropped file
40->215
217
Multi AV Scanner detection
for dropped file
40->217
219
Machine Learning detection
for dropped file
40->219
221
4 other signatures
40->221
55
explorer.exe
40->55
injected
151
C:\Users\user\AppData\Local\...\2Dc2225.exe, PE32
43->151
dropped
153
C:\Users\user\AppData\Local\...\1Ta10aM7.exe, PE32
43->153
dropped
60
1Ta10aM7.exe
1
43->60
started
62
2Dc2225.exe
1
43->62
started
191
239.255.255.250
unknown
Reserved
46->191
64
chrome.exe
46->64
started
66
chrome.exe
49->66
started
68
chrome.exe
51->68
started
70
chrome.exe
53->70
started
72
chrome.exe
53->72
started
74
4 other processes
53->74
file16
signatures17
process18
dnsIp19
171
185.196.8.238
SIMPLECARRER2IT
Switzerland
55->171
173
5.42.65.80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
55->173
179
2 other IPs or domains
55->179
143
C:\Users\user\AppData\Local\Temp\F6CF.exe, PE32
55->143
dropped
145
C:\Users\user\AppData\Local\TempF4C.exe, PE32
55->145
dropped
147
C:\Users\user\AppData\Local\Temp\CD8B.exe, PE32
55->147
dropped
149
4 other malicious files
55->149
dropped
237
System process connects
to network (likely due
to code injection or
exploit)
55->237
239
Benign windows process
drops PE files
55->239
76
A010.exe
55->76
started
80
AA04.exe
55->80
started
82
CD8B.exe
55->82
started
93
5 other processes
55->93
241
Multi AV Scanner detection
for dropped file
60->241
243
Machine Learning detection
for dropped file
60->243
245
Contains functionality
to inject code into
remote processes
60->245
85
AppLaunch.exe
11
508
60->85
started
87
AppLaunch.exe
60->87
started
95
2 other processes
60->95
247
Writes to foreign memory
regions
62->247
249
Allocates memory in
foreign processes
62->249
251
Injects a PE file into
a foreign processes
62->251
89
AppLaunch.exe
8
5
62->89
started
91
conhost.exe
62->91
started
175
t.co
104.244.42.197, 443, 49737
TWITTERUS
United States
64->175
177
twitter.com
104.244.42.65, 443, 49722
TWITTERUS
United States
64->177
181
34 other IPs or domains
64->181
file20
signatures21
process22
dnsIp23
185
194.169.175.235
CLOUDCOMPUTINGDE
Germany
76->185
255
Antivirus detection
for dropped file
76->255
257
Multi AV Scanner detection
for dropped file
76->257
259
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
76->259
261
Tries to steal Crypto
Currency Wallets
76->261
263
Machine Learning detection
for dropped file
80->263
265
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
80->265
275
3 other signatures
80->275
97
AA04.exe
80->97
started
123
C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32
82->123
dropped
125
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
82->125
dropped
127
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
82->127
dropped
137
2 other malicious files
82->137
dropped
187
194.49.94.152, 19053, 49704, 49706
EQUEST-ASNL
unknown
85->187
189
ipinfo.io
34.117.59.81, 443, 49705
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
85->189
129
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
85->129
dropped
131
C:\Users\user\AppData\...\FANBooster131.exe, PE32
85->131
dropped
133
C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32
85->133
dropped
135
C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32
85->135
dropped
267
Tries to steal Mail
credentials (via file
/ registry access)
85->267
277
6 other signatures
85->277
100
schtasks.exe
85->100
started
102
schtasks.exe
85->102
started
104
WerFault.exe
85->104
started
269
Contains functionality
to check for running
processes (XOR)
87->269
271
Found stalling execution
ending in API Sleep
call
87->271
279
3 other signatures
87->279
273
Found many strings related
to Crypto-Wallets (likely
being stolen)
89->273
106
chrome.exe
89->106
started
file24
signatures25
process26
dnsIp27
117
C:\Users\user\AppData\Local\...\XsdType.exe, PE32+
97->117
dropped
110
conhost.exe
100->110
started
112
conhost.exe
102->112
started
183
192.168.2.5, 19053, 443, 49703
unknown
unknown
106->183
253
Found many strings related
to Crypto-Wallets (likely
being stolen)
106->253
114
chrome.exe
106->114
started
file28
signatures29
process30
dnsIp31
163
142.251.163.113, 443, 49814, 49816
GOOGLEUS
United States
114->163
165
172.253.122.103, 443, 49818, 49819
GOOGLEUS
United States
114->165
167
7 other IPs or domains
114->167
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.