Threat name:
LummaC, Amadey, LummaC Stealer, PureLog
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1415312
Sample:
Vjt694rffx.exe
Startdate:
25/03/2024
Architecture:
WINDOWS
Score:
100
122
wisemassiveharmonious.shop
2->122
124
turkeyunlikelyofw.shop
2->124
126
12 other IPs or domains
2->126
172
Found malware configuration
2->172
174
Malicious sample detected
(through community Yara
rule)
2->174
176
Antivirus detection
for URL or domain
2->176
178
25 other signatures
2->178
10
explorgu.exe
2
56
2->10
started
15
Vjt694rffx.exe
5
2->15
started
17
ctvjctd
2->17
started
19
6 other processes
2->19
signatures3
process4
dnsIp5
128
185.215.113.32, 49705, 49706, 49708
WHOLESALECONNECTIONSNL
Portugal
10->128
130
185.172.128.19
NADYMSS-ASRU
Russian Federation
10->130
136
3 other IPs or domains
10->136
90
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
10->90
dropped
92
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
10->92
dropped
94
C:\Users\user\AppData\Local\...\amadka.exe, PE32
10->94
dropped
104
23 other malicious files
10->104
dropped
230
Antivirus detection
for dropped file
10->230
232
Multi AV Scanner detection
for dropped file
10->232
234
Detected unpacking (changes
PE section rights)
10->234
252
6 other signatures
10->252
21
987123.exe
10->21
started
24
alex1234.exe
10->24
started
26
osminog.exe
2
10->26
started
28
8 other processes
10->28
96
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
15->96
dropped
236
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
15->236
238
Tries to evade debugger
and weak emulator (self
modifying code)
15->238
240
Tries to detect virtualization
through RDTSC time measurements
15->240
242
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
17->242
244
Maps a DLL or memory
area into another process
17->244
254
2 other signatures
17->254
132
www.maxmind.com
104.18.146.235
CLOUDFLARENETUS
United States
19->132
134
127.0.0.1
unknown
unknown
19->134
98
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
19->98
dropped
100
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
19->100
dropped
102
C:\Users\user\AppData\Local\...\amadka.exe, PE32
19->102
dropped
106
2 other malicious files
19->106
dropped
246
Machine Learning detection
for dropped file
19->246
248
Creates multiple autostart
registry keys
19->248
250
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
19->250
file6
signatures7
process8
dnsIp9
180
Multi AV Scanner detection
for dropped file
21->180
182
Detected unpacking (changes
PE section rights)
21->182
184
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
21->184
200
4 other signatures
21->200
32
explorer.exe
21->32
injected
186
Writes to foreign memory
regions
24->186
202
2 other signatures
24->202
37
RegAsm.exe
24->37
started
39
conhost.exe
24->39
started
188
Machine Learning detection
for dropped file
26->188
190
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->190
192
LummaC encrypted strings
found
26->192
41
RegAsm.exe
26->41
started
43
conhost.exe
26->43
started
138
193.233.132.74, 49737, 58709
FREE-NET-ASFREEnetEU
Russian Federation
28->138
140
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
28->140
142
3 other IPs or domains
28->142
108
C:\Users\user\AppData\Local\...\chrosha.exe, PE32
28->108
dropped
110
C:\Users\user\AppData\Local\...\RageMP131.exe, PE32
28->110
dropped
112
C:\ProgramData\MPGPH131\MPGPH131.exe, PE32
28->112
dropped
194
System process connects
to network (likely due
to code injection or
exploit)
28->194
196
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
28->196
198
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
28->198
204
8 other signatures
28->204
45
rundll32.exe
23
28->45
started
47
RegAsm.exe
28->47
started
49
RegAsm.exe
28->49
started
51
6 other processes
28->51
file10
signatures11
process12
dnsIp13
114
selebration17io.io
91.215.85.120
PINDC-ASRU
Russian Federation
32->114
80
C:\Users\user\AppData\Roaming\ctvjctd, PE32
32->80
dropped
82
C:\Users\user\AppData\Local\Temp\41A2.exe, PE32
32->82
dropped
148
System process connects
to network (likely due
to code injection or
exploit)
32->148
150
Benign windows process
drops PE files
32->150
152
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
32->152
53
RageMP131.exe
32->53
started
56
41A2.exe
32->56
started
58
random.exe
32->58
started
60
RageMP131.exe
32->60
started
84
C:\Users\user\AppData\Roaming\...\propro.exe, PE32
37->84
dropped
86
C:\Users\user\AppData\Roaming\...\Traffic.exe, PE32
37->86
dropped
62
Traffic.exe
37->62
started
65
propro.exe
37->65
started
116
resergvearyinitiani.shop
172.67.217.100, 443, 49710, 49714
CLOUDFLARENETUS
United States
41->116
154
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
41->154
156
Query firmware table
information (likely
to detect VMs)
41->156
158
Found many strings related
to Crypto-Wallets (likely
being stolen)
41->158
160
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
41->160
162
Tries to steal Instant
Messenger accounts or
passwords
45->162
164
Uses netsh to modify
the Windows network
and firewall settings
45->164
166
Tries to harvest and
steal ftp login credentials
45->166
170
2 other signatures
45->170
67
powershell.exe
45->67
started
70
netsh.exe
2
45->70
started
118
associationokeo.shop
172.67.147.18
CLOUDFLARENETUS
United States
47->118
168
Tries to steal Crypto
Currency Wallets
47->168
120
4.185.137.132, 1632, 49720
LEVEL3US
United States
49->120
72
2 other processes
51->72
file14
signatures15
process16
dnsIp17
206
Detected unpacking (changes
PE section rights)
53->206
208
Machine Learning detection
for dropped file
53->208
210
Tries to evade debugger
and weak emulator (self
modifying code)
53->210
212
Query firmware table
information (likely
to detect VMs)
56->212
214
Tries to harvest and
steal browser information
(history, passwords,
etc)
56->214
216
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
58->216
144
5.42.65.67
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
62->144
218
Multi AV Scanner detection
for dropped file
62->218
220
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
62->220
222
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
62->222
224
Reads the System eventlog
62->224
74
conhost.exe
62->74
started
146
185.172.128.33
NADYMSS-ASRU
Russian Federation
65->146
226
Installs new ROOT certificates
65->226
228
Tries to steal Crypto
Currency Wallets
65->228
88
C:\Users\user\...\246122658369_Desktop.zip, Zip
67->88
dropped
76
conhost.exe
67->76
started
78
conhost.exe
70->78
started
file18
signatures19
process20
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.