Threat name:
LummaC, Amadey, Glupteba, LummaC Stealer
Alert
Classification:
rans.phis.troj.spyw.expl.evad
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1435256
Sample:
U8uFcjIjAR.exe
Startdate:
02/05/2024
Architecture:
WINDOWS
Score:
100
233
Found malware configuration
2->233
235
Malicious sample detected
(through community Yara
rule)
2->235
237
Antivirus / Scanner
detection for submitted
sample
2->237
239
25 other signatures
2->239
10
U8uFcjIjAR.exe
5
2->10
started
14
explorha.exe
2->14
started
16
svchost.exe
2->16
started
19
3 other processes
2->19
process3
dnsIp4
131
C:\Users\user\AppData\Local\...\explorha.exe, PE32
10->131
dropped
257
Detected unpacking (changes
PE section rights)
10->257
259
Tries to evade debugger
and weak emulator (self
modifying code)
10->259
261
Tries to detect virtualization
through RDTSC time measurements
10->261
21
explorha.exe
42
10->21
started
263
Hides threads from debuggers
14->263
265
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
14->265
267
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
14->267
149
40.126.24.149
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
16->149
151
23.44.201.207
AKAMAI-ASN1EU
United States
16->151
269
Installs new ROOT certificates
16->269
26
WerFault.exe
19->26
started
28
WerFault.exe
19->28
started
30
WerFault.exe
19->30
started
file5
signatures6
process7
dnsIp8
163
185.172.128.19
NADYMSS-ASRU
Russian Federation
21->163
165
193.233.132.56
FREE-NET-ASFREEnetEU
Russian Federation
21->165
167
193.233.132.234
FREE-NET-ASFREEnetEU
Russian Federation
21->167
123
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
21->123
dropped
125
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
21->125
dropped
127
C:\Users\user\AppData\...\alexxxxxxxx.exe, PE32
21->127
dropped
129
17 other malicious files
21->129
dropped
249
Detected unpacking (changes
PE section rights)
21->249
251
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
21->251
253
Tries to evade debugger
and weak emulator (self
modifying code)
21->253
255
3 other signatures
21->255
32
file300un.exe
21->32
started
35
NewB.exe
21->35
started
39
swiiiii.exe
1
21->39
started
41
7 other processes
21->41
file9
signatures10
process11
dnsIp12
189
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
32->189
191
Writes to foreign memory
regions
32->191
193
Allocates memory in
foreign processes
32->193
211
3 other signatures
32->211
43
InstallUtil.exe
32->43
started
56
4 other processes
32->56
153
185.172.128.59
NADYMSS-ASRU
Russian Federation
35->153
155
104.21.84.71
CLOUDFLARENETUS
United States
35->155
157
172.67.197.33
CLOUDFLARENETUS
United States
35->157
111
C:\...\4767d2e713f2021e8fe856e3ea638b58.exe, PE32
35->111
dropped
113
C:\Users\user\AppData\Local\...\ISetup8.exe, PE32
35->113
dropped
115
C:\Users\user\AppData\...\ISetup8[1].exe, PE32
35->115
dropped
117
4767d2e713f2021e8fe856e3ea638b58[1].exe, PE32
35->117
dropped
195
Creates an undocumented
autostart registry key
35->195
197
Uses schtasks.exe or
at.exe to add and modify
task schedules
35->197
48
ISetup8.exe
35->48
started
58
2 other processes
35->58
199
Contains functionality
to inject code into
remote processes
39->199
201
Injects a PE file into
a foreign processes
39->201
203
LummaC encrypted strings
found
39->203
50
RegAsm.exe
39->50
started
60
2 other processes
39->60
159
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
41->159
161
116.202.23.44
HETZNER-ASDE
Germany
41->161
119
C:\Users\user\AppData\Local\Temp\svrht.exe, PE32
41->119
dropped
121
C:\Users\user\AppData\Local\Temp\...\work.exe, PE32
41->121
dropped
205
System process connects
to network (likely due
to code injection or
exploit)
41->205
207
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
41->207
209
Installs new ROOT certificates
41->209
213
3 other signatures
41->213
52
rundll32.exe
25
41->52
started
54
cmd.exe
41->54
started
62
4 other processes
41->62
file13
signatures14
process15
dnsIp16
185
10 other IPs or domains
43->185
133
C:\Users\...\yWV9WwJcUosMiP7cfkSd3H82.exe, PE32
43->133
dropped
135
C:\Users\...\yUP3tf3QnRZ1nTqTKGi8mWAl.exe, PE32
43->135
dropped
137
C:\Users\...\xyMqBBjqvGfUL37YvYIuomy7.exe, PE32
43->137
dropped
145
129 other malicious files
43->145
dropped
271
Creates HTML files with
.exe extension (expired
dropper behavior)
43->271
273
Writes many files with
high entropy
43->273
64
CpqmTFb0JovJ1ZbssYgoEukK.exe
43->64
started
68
G5ySvIIiUZEng2gHEb0ia9X8.exe
43->68
started
175
185.172.128.228
NADYMSS-ASRU
Russian Federation
48->175
177
185.172.128.90
NADYMSS-ASRU
Russian Federation
48->177
179
176.97.76.106
INTRAFFIC-ASUA
United Kingdom
48->179
139
C:\Users\user\AppData\Local\Temp\u1eg.3.exe, PE32
48->139
dropped
141
C:\Users\user\AppData\Local\Temp\...\run.exe, PE32
48->141
dropped
143
C:\Users\user\AppData\Local\...\relay.dll, PE32
48->143
dropped
147
3 other malicious files
48->147
dropped
275
Detected unpacking (changes
PE section rights)
48->275
277
Detected unpacking (overwrites
its own PE header)
48->277
70
u1eg.0.exe
48->70
started
181
104.21.67.211
CLOUDFLARENETUS
United States
50->181
279
Query firmware table
information (likely
to detect VMs)
50->279
281
Found many strings related
to Crypto-Wallets (likely
being stolen)
50->281
283
Tries to harvest and
steal browser information
(history, passwords,
etc)
50->283
285
Tries to steal Instant
Messenger accounts or
passwords
52->285
287
Uses netsh to modify
the Windows network
and firewall settings
52->287
289
Tries to harvest and
steal ftp login credentials
52->289
291
Tries to harvest and
steal WLAN passwords
52->291
83
2 other processes
52->83
73
work.exe
54->73
started
75
conhost.exe
54->75
started
77
conhost.exe
56->77
started
79
conhost.exe
58->79
started
183
20.42.65.92
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
60->183
187
3 other IPs or domains
62->187
293
Tries to steal Crypto
Currency Wallets
62->293
81
Conhost.exe
62->81
started
file17
signatures18
process19
dnsIp20
93
C:\Users\user\AppData\Local\Temp\...\run.exe, PE32
64->93
dropped
95
C:\Users\user\AppData\Local\...\relay.dll, PE32
64->95
dropped
97
C:\Users\user\AppData\...\UIxMarketPlugin.dll, PE32
64->97
dropped
107
2 other malicious files
64->107
dropped
215
Writes many files with
high entropy
64->215
217
Found Tor onion address
68->217
219
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
68->219
173
185.172.128.150
NADYMSS-ASRU
Russian Federation
70->173
99
C:\Users\user\AppData\...\softokn3[1].dll, PE32
70->99
dropped
101
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
70->101
dropped
109
10 other files (2 malicious)
70->109
dropped
221
Detected unpacking (changes
PE section rights)
70->221
223
Detected unpacking (overwrites
its own PE header)
70->223
225
Tries to steal Mail
credentials (via file
/ registry access)
70->225
231
5 other signatures
70->231
103
C:\Users\user\AppData\Local\...\podaw.exe, PE32
73->103
dropped
85
podaw.exe
73->85
started
105
C:\Users\user\...\246122658369_Desktop.zip, Zip
83->105
dropped
227
Installs new ROOT certificates
83->227
229
Loading BitLocker PowerShell
Module
83->229
89
conhost.exe
83->89
started
91
conhost.exe
83->91
started
file21
signatures22
process23
dnsIp24
169
104.21.86.106
CLOUDFLARENETUS
United States
85->169
171
172.67.218.63
CLOUDFLARENETUS
United States
85->171
241
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
85->241
243
Query firmware table
information (likely
to detect VMs)
85->243
245
Tries to harvest and
steal browser information
(history, passwords,
etc)
85->245
247
Tries to steal Crypto
Currency Wallets
85->247
signatures25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://193.233.132.56/mine/amert.exe