Threat name:
LummaC Stealer, PrivateLoader, RedLine,
Alert
Classification:
troj.spyw.evad
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check for running processes (XOR)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1350431
Sample:
zx6GVwK8vI.exe
Startdate:
30/11/2023
Architecture:
WINDOWS
Score:
100
159
tirechinecarpett.pw
2->159
161
pic.himanfast.com
2->161
163
3 other IPs or domains
2->163
209
Snort IDS alert for
network traffic
2->209
211
Found malware configuration
2->211
213
Malicious sample detected
(through community Yara
rule)
2->213
215
18 other signatures
2->215
13
zx6GVwK8vI.exe
1
4
2->13
started
16
MajorRevision.exe
2->16
started
19
svchost.exe
2->19
started
22
7 other processes
2->22
signatures3
process4
dnsIp5
155
C:\Users\user\AppData\Local\...\ct7zo95.exe, PE32
13->155
dropped
157
C:\Users\user\AppData\Local\...\5xy0dV0.exe, PE32
13->157
dropped
24
ct7zo95.exe
1
4
13->24
started
195
Multi AV Scanner detection
for dropped file
16->195
197
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
16->197
199
Modifies the context
of a thread in another
process (thread injection)
16->199
201
Injects a PE file into
a foreign processes
16->201
28
MajorRevision.exe
16->28
started
171
127.0.0.1
unknown
unknown
19->171
30
WerFault.exe
22->30
started
file6
signatures7
process8
file9
139
C:\Users\user\AppData\Local\...\qU2ML43.exe, PE32
24->139
dropped
141
C:\Users\user\AppData\Local\...\4wO042pm.exe, PE32
24->141
dropped
225
Antivirus detection
for dropped file
24->225
227
Binary is likely a compiled
AutoIt script file
24->227
229
Machine Learning detection
for dropped file
24->229
32
qU2ML43.exe
1
4
24->32
started
36
4wO042pm.exe
24->36
started
231
Writes to foreign memory
regions
28->231
233
Modifies the context
of a thread in another
process (thread injection)
28->233
235
Sample uses process
hollowing technique
28->235
237
Injects a PE file into
a foreign processes
28->237
38
MSBuild.exe
28->38
started
signatures10
process11
file12
117
C:\Users\user\AppData\Local\...\OV2rL18.exe, PE32
32->117
dropped
119
C:\Users\user\AppData\Local\...\3gl83kn.exe, PE32
32->119
dropped
203
Antivirus detection
for dropped file
32->203
205
Machine Learning detection
for dropped file
32->205
40
3gl83kn.exe
32->40
started
43
OV2rL18.exe
1
4
32->43
started
207
Binary is likely a compiled
AutoIt script file
36->207
46
chrome.exe
36->46
started
49
chrome.exe
36->49
started
51
chrome.exe
36->51
started
53
7 other processes
36->53
signatures13
process14
dnsIp15
217
Antivirus detection
for dropped file
40->217
219
Machine Learning detection
for dropped file
40->219
221
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
40->221
223
4 other signatures
40->223
55
explorer.exe
40->55
injected
151
C:\Users\user\AppData\Local\...\2rV3533.exe, PE32
43->151
dropped
153
C:\Users\user\AppData\Local\...\1WL66ac6.exe, PE32
43->153
dropped
60
1WL66ac6.exe
1
43->60
started
62
2rV3533.exe
1
43->62
started
193
239.255.255.250
unknown
Reserved
46->193
64
chrome.exe
46->64
started
66
chrome.exe
49->66
started
68
chrome.exe
51->68
started
70
chrome.exe
53->70
started
72
chrome.exe
53->72
started
74
5 other processes
53->74
file16
signatures17
process18
dnsIp19
173
185.196.8.238
SIMPLECARRER2IT
Switzerland
55->173
175
5.42.65.80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
55->175
181
2 other IPs or domains
55->181
143
C:\Users\user\AppData\Local\Temp673.exe, PE32
55->143
dropped
145
C:\Users\user\AppData\Local\Temp\C34A.exe, PE32+
55->145
dropped
147
C:\Users\user\AppData\Local\Temp\B05E.exe, PE32
55->147
dropped
149
5 other malicious files
55->149
dropped
239
System process connects
to network (likely due
to code injection or
exploit)
55->239
241
Benign windows process
drops PE files
55->241
76
B05E.exe
55->76
started
80
E673.exe
55->80
started
83
C34A.exe
55->83
started
93
6 other processes
55->93
243
Multi AV Scanner detection
for dropped file
60->243
245
Machine Learning detection
for dropped file
60->245
247
Contains functionality
to inject code into
remote processes
60->247
85
AppLaunch.exe
11
508
60->85
started
87
conhost.exe
60->87
started
249
Writes to foreign memory
regions
62->249
251
Allocates memory in
foreign processes
62->251
253
Injects a PE file into
a foreign processes
62->253
89
AppLaunch.exe
8
5
62->89
started
91
conhost.exe
62->91
started
177
t.co
104.244.42.133
TWITTERUS
United States
64->177
179
twitter.com
104.244.42.193
TWITTERUS
United States
64->179
183
44 other IPs or domains
64->183
file20
signatures21
process22
dnsIp23
187
194.169.175.235
CLOUDCOMPUTINGDE
Germany
76->187
257
Antivirus detection
for dropped file
76->257
259
Multi AV Scanner detection
for dropped file
76->259
261
Machine Learning detection
for dropped file
76->261
121
C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32
80->121
dropped
123
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
80->123
dropped
125
C:\Users\user\AppData\Local\...\latestX.exe, PE32+
80->125
dropped
135
2 other malicious files
80->135
dropped
95
InstallSetup9.exe
80->95
started
263
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
83->263
265
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
83->265
267
Modifies the context
of a thread in another
process (thread injection)
83->267
269
Injects a PE file into
a foreign processes
83->269
97
C34A.exe
83->97
started
189
194.49.94.152
EQUEST-ASNL
unknown
85->189
191
ipinfo.io
34.117.59.81
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
85->191
127
C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII
85->127
dropped
129
C:\Users\user\AppData\...\FANBooster131.exe, PE32
85->129
dropped
131
C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32
85->131
dropped
133
C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32
85->133
dropped
271
Contains functionality
to check for running
processes (XOR)
85->271
273
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
85->273
275
Tries to steal Mail
credentials (via file
/ registry access)
85->275
279
10 other signatures
85->279
100
schtasks.exe
85->100
started
102
schtasks.exe
85->102
started
104
WerFault.exe
85->104
started
277
Found many strings related
to Crypto-Wallets (likely
being stolen)
89->277
106
chrome.exe
89->106
started
file24
signatures25
process26
dnsIp27
137
C:\Users\user\AppData\...\MajorRevision.exe, PE32+
97->137
dropped
110
conhost.exe
100->110
started
112
conhost.exe
102->112
started
185
192.168.2.5
unknown
unknown
106->185
255
Found many strings related
to Crypto-Wallets (likely
being stolen)
106->255
114
chrome.exe
106->114
started
file28
signatures29
process30
dnsIp31
165
172.253.122.101
GOOGLEUS
United States
114->165
167
172.253.63.104
GOOGLEUS
United States
114->167
169
5 other IPs or domains
114->169
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.