Threat name:
LummaC, Python Stealer, Amadey, LummaC S
Alert
Classification:
troj.spyw.evad
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected generic credential text file
Detected unpacking (changes PE section rights)
Disable Task Manager(disabletaskmgr)
Disables the Windows task manager (taskmgr)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Gathers network related connection and port information
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Powershell downloading file from url shortener site
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Python Stealer
Yara detected LummaC Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1461287
Sample:
mCTacyNuyM.exe
Startdate:
23/06/2024
Architecture:
WINDOWS
Score:
100
147
github.com
2->147
149
disappointcredisotw.shop
2->149
151
6 other IPs or domains
2->151
175
Snort IDS alert for
network traffic
2->175
177
Multi AV Scanner detection
for domain / URL
2->177
179
Found malware configuration
2->179
181
27 other signatures
2->181
12
mCTacyNuyM.exe
5
2->12
started
16
svchost.exe
2->16
started
19
Hkbsse.exe
2->19
started
21
2 other processes
2->21
signatures3
process4
dnsIp5
131
C:\Users\user\AppData\Local\...\axplong.exe, PE32
12->131
dropped
133
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
12->133
dropped
221
Detected unpacking (changes
PE section rights)
12->221
223
Tries to evade debugger
and weak emulator (self
modifying code)
12->223
225
Tries to detect virtualization
through RDTSC time measurements
12->225
227
3 other signatures
12->227
23
axplong.exe
40
12->23
started
145
127.0.0.1
unknown
unknown
16->145
file6
signatures7
process8
dnsIp9
159
185.172.128.116, 49737, 49744, 49747
NADYMSS-ASRU
Russian Federation
23->159
161
github.com
140.82.121.4, 443, 49739
GITHUBUS
United States
23->161
163
2 other IPs or domains
23->163
111
C:\Users\user\AppData\Local\...\googleads.exe, PE32
23->111
dropped
113
C:\Users\user\AppData\Local\...\judit.exe, PE32+
23->113
dropped
115
C:\Users\user\AppData\...\taskweaker.exe, PE32+
23->115
dropped
117
15 other malicious files
23->117
dropped
187
Antivirus detection
for dropped file
23->187
189
Multi AV Scanner detection
for dropped file
23->189
191
Detected unpacking (changes
PE section rights)
23->191
193
6 other signatures
23->193
28
judit.exe
23->28
started
32
gold.exe
23->32
started
34
Installer.exe
23->34
started
36
6 other processes
23->36
file10
signatures11
process12
dnsIp13
135
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
28->135
dropped
137
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
28->137
dropped
139
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
28->139
dropped
143
32 other files (31 malicious)
28->143
dropped
229
Multi AV Scanner detection
for dropped file
28->229
231
Machine Learning detection
for dropped file
28->231
233
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
28->233
39
stub.exe
28->39
started
235
Contains functionality
to inject code into
remote processes
32->235
237
Writes to foreign memory
regions
32->237
239
Allocates memory in
foreign processes
32->239
241
Injects a PE file into
a foreign processes
32->241
44
RegAsm.exe
5
2
32->44
started
46
RegAsm.exe
32->46
started
48
RegAsm.exe
32->48
started
50
cmd.exe
34->50
started
153
185.215.113.67, 40960, 49734
WHOLESALECONNECTIONSNL
Portugal
36->153
141
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
36->141
dropped
243
Antivirus detection
for dropped file
36->243
245
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
36->245
247
Found many strings related
to Crypto-Wallets (likely
being stolen)
36->247
249
4 other signatures
36->249
52
BitLockerToGo.exe
36->52
started
54
RegAsm.exe
36->54
started
56
Hkbsse.exe
36->56
started
58
2 other processes
36->58
file14
signatures15
process16
dnsIp17
165
ip-api.com
208.95.112.1
TUT-ASUS
United States
39->165
167
restores.name
65.0.21.192
AMAZON-02US
United States
39->167
119
C:\Users\user\AppData\Local\...\Monster.exe, PE32+
39->119
dropped
121
C:\Users\user\AppData\...\system_info.txt, Algol
39->121
dropped
123
C:\Users\user\AppData\...\process_info.txt, ASCII
39->123
dropped
127
3 other malicious files
39->127
dropped
195
Multi AV Scanner detection
for dropped file
39->195
197
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
39->197
199
Tries to harvest and
steal browser information
(history, passwords,
etc)
39->199
219
5 other signatures
39->219
60
cmd.exe
39->60
started
62
cmd.exe
39->62
started
65
cmd.exe
39->65
started
77
9 other processes
39->77
169
4.185.27.237, 13528, 49735
LEVEL3US
United States
44->169
201
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
46->201
203
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
46->203
125
C:\Users\user\AppData\Local\...\install.bat, ASCII
50->125
dropped
205
Suspicious powershell
command line found
50->205
207
Uses schtasks.exe or
at.exe to add and modify
task schedules
50->207
209
Uses netsh to modify
the Windows network
and firewall settings
50->209
211
Uses attrib.exe to hide
files
50->211
67
powershell.exe
50->67
started
69
powershell.exe
50->69
started
72
powershell.exe
50->72
started
79
3 other processes
50->79
171
disappointcredisotw.shop
188.114.97.3
CLOUDFLARENETUS
European Union
52->171
213
Query firmware table
information (likely
to detect VMs)
52->213
215
Tries to harvest and
steal ftp login credentials
52->215
217
Tries to steal Crypto
Currency Wallets
52->217
75
conhost.exe
54->75
started
file18
signatures19
process20
dnsIp21
81
systeminfo.exe
60->81
started
94
2 other processes
60->94
251
Tries to harvest and
steal WLAN passwords
62->251
96
2 other processes
62->96
84
conhost.exe
65->84
started
86
WMIC.exe
65->86
started
88
cmd.exe
67->88
started
155
bit.ly
67.199.248.11, 443, 49758
GOOGLE-PRIVATE-CLOUDUS
United States
69->155
157
pixel.com
54.67.42.145, 443, 49760
AMAZON-02US
United States
69->157
129
C:\Users\user\AppData\Local\Corporation.zip, Zip
72->129
dropped
90
conhost.exe
77->90
started
92
conhost.exe
77->92
started
98
13 other processes
77->98
file22
signatures23
process24
signatures25
173
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
81->173
100
WmiPrvSE.exe
81->100
started
102
reg.exe
88->102
started
105
conhost.exe
88->105
started
107
schtasks.exe
88->107
started
109
2 other processes
88->109
process26
signatures27
183
Disable Task Manager(disabletaskmgr)
102->183
185
Disables the Windows
task manager (taskmgr)
102->185
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://77.91.77.81/soka/random.exe