Threat name:
LummaC, Amadey, LummaC Stealer, Stealc,
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1552446
Sample:
file.exe
Startdate:
08/11/2024
Architecture:
WINDOWS
Score:
100
86
husktools.duckdns.org
2->86
88
worddosofrm.shop
2->88
90
17 other IPs or domains
2->90
120
Suricata IDS alerts
for network traffic
2->120
122
Found malware configuration
2->122
124
Malicious sample detected
(through community Yara
rule)
2->124
128
21 other signatures
2->128
9
skotes.exe
3
28
2->9
started
14
file.exe
37
2->14
started
16
30b80be49e.exe
2->16
started
18
4 other processes
2->18
signatures3
126
Uses dynamic DNS services
86->126
process4
dnsIp5
104
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
9->104
106
husktools.duckdns.org
31.13.224.189
SARNICA-ASBG
Bulgaria
9->106
108
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
9->108
70
C:\Users\user\AppData\...\4fc071bd85.exe, PE32
9->70
dropped
72
C:\Users\user\AppData\...\2b79b65d74.exe, PE32
9->72
dropped
74
C:\Users\user\AppData\...\30b80be49e.exe, PE32
9->74
dropped
82
6 other malicious files
9->82
dropped
188
Creates multiple autostart
registry keys
9->188
190
Hides threads from debuggers
9->190
192
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
9->192
20
joined.exe
9->20
started
24
30b80be49e.exe
9->24
started
26
4fc071bd85.exe
9->26
started
33
3 other processes
9->33
110
185.215.113.206, 49730, 49760, 80
WHOLESALECONNECTIONSNL
Portugal
14->110
112
185.215.113.16, 49763, 80
WHOLESALECONNECTIONSNL
Portugal
14->112
114
127.0.0.1
unknown
unknown
14->114
76
C:\Users\user\DocumentsEGCBAFCFIJ.exe, PE32
14->76
dropped
78
C:\Users\user\AppData\...\softokn3[1].dll, PE32
14->78
dropped
80
C:\Users\user\AppData\Local\...\random[1].exe, PE32
14->80
dropped
84
12 other files (8 malicious)
14->84
dropped
194
Detected unpacking (changes
PE section rights)
14->194
196
Attempt to bypass Chrome
Application-Bound Encryption
14->196
198
Drops PE files to the
document folder of the
user
14->198
210
6 other signatures
14->210
28
cmd.exe
1
14->28
started
30
chrome.exe
14->30
started
200
Query firmware table
information (likely
to detect VMs)
16->200
202
Tries to harvest and
steal ftp login credentials
16->202
204
Tries to harvest and
steal browser information
(history, passwords,
etc)
16->204
206
Tries to steal Crypto
Currency Wallets
18->206
208
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
18->208
file6
signatures7
process8
dnsIp9
64
C:\Users\user\AppData\...\tELD4e4f58.exe, PE32
20->64
dropped
66
C:\Users\user\AppData\...\eJ2mwP8VTS.exe, PE32
20->66
dropped
150
Multi AV Scanner detection
for dropped file
20->150
152
Machine Learning detection
for dropped file
20->152
35
eJ2mwP8VTS.exe
20->35
started
38
tELD4e4f58.exe
20->38
started
154
Antivirus detection
for dropped file
24->154
156
Detected unpacking (changes
PE section rights)
24->156
158
Query firmware table
information (likely
to detect VMs)
24->158
172
4 other signatures
24->172
160
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
26->160
162
Modifies windows update
settings
26->162
164
Disables Windows Defender
Tamper protection
26->164
174
2 other signatures
26->174
41
DocumentsEGCBAFCFIJ.exe
4
28->41
started
44
conhost.exe
28->44
started
116
192.168.2.4, 443, 49723, 49730
unknown
unknown
30->116
118
239.255.255.250
unknown
Reserved
30->118
46
chrome.exe
30->46
started
166
Tries to evade debugger
and weak emulator (self
modifying code)
33->166
168
Hides threads from debuggers
33->168
170
Injects a PE file into
a foreign processes
33->170
48
crypted.exe
33->48
started
50
conhost.exe
33->50
started
52
WerFault.exe
33->52
started
file10
signatures11
process12
dnsIp13
130
Multi AV Scanner detection
for dropped file
35->130
132
Injects a PE file into
a foreign processes
35->132
134
LummaC encrypted strings
found
35->134
54
eJ2mwP8VTS.exe
35->54
started
58
conhost.exe
35->58
started
60
WerFault.exe
35->60
started
92
87.120.117.209
UNACS-AS-BG8000BurgasBG
Bulgaria
38->92
136
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
38->136
68
C:\Users\user\AppData\Local\...\skotes.exe, PE32
41->68
dropped
138
Detected unpacking (changes
PE section rights)
41->138
140
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
41->140
142
Tries to evade debugger
and weak emulator (self
modifying code)
41->142
148
5 other signatures
41->148
62
skotes.exe
41->62
started
94
play.google.com
142.250.185.110, 443, 49749, 49757
GOOGLEUS
United States
46->94
96
www.google.com
142.250.186.132, 443, 49732, 49735
GOOGLEUS
United States
46->96
100
2 other IPs or domains
46->100
98
navygenerayk.store
188.114.96.3
CLOUDFLARENETUS
European Union
48->98
144
Query firmware table
information (likely
to detect VMs)
48->144
146
Tries to steal Crypto
Currency Wallets
48->146
file14
signatures15
process16
dnsIp17
102
steamcommunity.com
23.192.247.89
AKAMAI-ASUS
United States
54->102
176
Query firmware table
information (likely
to detect VMs)
54->176
178
Tries to steal Crypto
Currency Wallets
54->178
180
Detected unpacking (changes
PE section rights)
62->180
182
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
62->182
184
Tries to evade debugger
and weak emulator (self
modifying code)
62->184
186
3 other signatures
62->186
signatures18
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.