Threat name:
Glupteba, LummaC Stealer, PrivateLoader,
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1358086
Sample:
jxl4aT3uFM.exe
Startdate:
11/12/2023
Architecture:
WINDOWS
Score:
100
122
ipinfo.io
2->122
136
Snort IDS alert for
network traffic
2->136
138
Multi AV Scanner detection
for domain / URL
2->138
140
Found malware configuration
2->140
142
16 other signatures
2->142
12
jxl4aT3uFM.exe
1
4
2->12
started
16
OfficeTrackerNMP131.exe
10
501
2->16
started
18
OfficeTrackerNMP131.exe
2->18
started
20
11 other processes
2->20
signatures3
process4
file5
106
C:\Users\user\AppData\Local\...\UU2rF15.exe, PE32
12->106
dropped
108
C:\Users\user\AppData\Local\...\6IJ9jb4.exe, PE32
12->108
dropped
196
Binary is likely a compiled
AutoIt script file
12->196
22
UU2rF15.exe
1
4
12->22
started
110
C:\...\cFyXMPD6VqPkKVk98nctvxsy9B0RiYf9.zip, Zip
16->110
dropped
198
Antivirus detection
for dropped file
16->198
200
Multi AV Scanner detection
for dropped file
16->200
202
Tries to steal Mail
credentials (via file
/ registry access)
16->202
212
5 other signatures
16->212
26
WerFault.exe
16->26
started
112
C:\...behaviorgraphV36pTc_E3lPskGlZQz12NqbIsHHMlE8.zip, Zip
18->112
dropped
204
Found many strings related
to Crypto-Wallets (likely
being stolen)
18->204
206
Disables Windows Defender
(deletes autostart)
18->206
208
Tries to harvest and
steal browser information
(history, passwords,
etc)
18->208
28
WerFault.exe
18->28
started
210
Machine Learning detection
for dropped file
20->210
30
WerFault.exe
20->30
started
32
WerFault.exe
20->32
started
34
WerFault.exe
20->34
started
signatures6
process7
file8
82
C:\Users\user\AppData\Local\...\4UI741VD.exe, PE32
22->82
dropped
84
C:\Users\user\AppData\Local\...\1Lq08Hr3.exe, PE32
22->84
dropped
172
Multi AV Scanner detection
for dropped file
22->172
36
4UI741VD.exe
22->36
started
39
1Lq08Hr3.exe
11
508
22->39
started
signatures9
process10
dnsIp11
144
Multi AV Scanner detection
for dropped file
36->144
146
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
36->146
148
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
36->148
156
3 other signatures
36->156
43
explorer.exe
36->43
injected
124
193.233.132.51, 49729, 49730, 49731
FREE-NET-ASFREEnetEU
Russian Federation
39->124
126
ipinfo.io
34.117.59.81, 443, 49732, 49733
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
39->126
96
C:\Users\user\AppData\...\FANBooster131.exe, PE32
39->96
dropped
98
C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32
39->98
dropped
100
C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32
39->100
dropped
102
2 other malicious files
39->102
dropped
150
Tries to steal Mail
credentials (via file
/ registry access)
39->150
152
Found stalling execution
ending in API Sleep
call
39->152
154
Disables Windows Defender
(deletes autostart)
39->154
158
7 other signatures
39->158
48
schtasks.exe
1
39->48
started
50
schtasks.exe
1
39->50
started
52
WerFault.exe
39->52
started
file12
signatures13
process14
dnsIp15
132
185.172.128.19, 49753, 80
NADYMSS-ASRU
Russian Federation
43->132
134
81.19.131.34, 49752, 80
IVC-ASRU
Russian Federation
43->134
114
C:\Users\user\AppData\Local\Temp\D873.exe, PE32
43->114
dropped
116
C:\Users\user\AppData\Local\Temp\CB91.exe, PE32
43->116
dropped
118
C:\Users\user\AppData\Local\Temp\BE42.exe, PE32
43->118
dropped
120
2 other malicious files
43->120
dropped
214
System process connects
to network (likely due
to code injection or
exploit)
43->214
216
Benign windows process
drops PE files
43->216
54
B392.exe
43->54
started
58
BE42.exe
43->58
started
61
CB91.exe
43->61
started
63
854E.exe
43->63
started
65
conhost.exe
48->65
started
67
conhost.exe
50->67
started
file16
signatures17
process18
dnsIp19
86
C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32
54->86
dropped
88
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
54->88
dropped
90
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
54->90
dropped
94
2 other malicious files
54->94
dropped
174
Antivirus detection
for dropped file
54->174
176
Multi AV Scanner detection
for dropped file
54->176
178
Machine Learning detection
for dropped file
54->178
69
31839b57a4f11171d6abc8bbc4451ee4.exe
54->69
started
72
toolspub2.exe
54->72
started
74
InstallSetup9.exe
54->74
started
77
InstallSetup9.exe
54->77
started
128
176.123.7.190
ALEXHOSTMD
Moldova Republic of
58->128
180
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
58->180
182
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
58->182
184
Tries to harvest and
steal browser information
(history, passwords,
etc)
58->184
186
Tries to steal Crypto
Currency Wallets
58->186
92
C:\Users\user\AppData\...\Protect544cd51a.dll, PE32
61->92
dropped
188
Writes to foreign memory
regions
61->188
190
Allocates memory in
foreign processes
61->190
192
Sample uses process
hollowing technique
61->192
194
Injects a PE file into
a foreign processes
61->194
130
77.105.132.87
PLUSTELECOM-ASRU
Russian Federation
63->130
file20
signatures21
process22
file23
160
Antivirus detection
for dropped file
69->160
162
Multi AV Scanner detection
for dropped file
69->162
164
Detected unpacking (changes
PE section rights)
69->164
170
3 other signatures
69->170
166
Sample uses process
hollowing technique
72->166
168
Injects a PE file into
a foreign processes
72->168
104
C:\Users\user\AppData\Local\Temp\Broom.exe, PE32
74->104
dropped
79
Broom.exe
74->79
started
signatures24
process25
signatures26
218
Multi AV Scanner detection
for dropped file
79->218
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.