Threat name:
LummaC, Amadey, AsyncRAT, LummaC Stealer
Alert
Classification:
rans.troj.spyw.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected Vidar stealer
Yara detected WorldWind Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1580865
Sample:
i8Vwc7iOaG.exe
Startdate:
26/12/2024
Architecture:
WINDOWS
Score:
100
170
Found malware configuration
2->170
172
Malicious sample detected
(through community Yara
rule)
2->172
174
Antivirus detection
for URL or domain
2->174
176
27 other signatures
2->176
9
skotes.exe
50
2->9
started
14
i8Vwc7iOaG.exe
2
2->14
started
16
axplong.exe
2->16
started
18
5 other processes
2->18
process3
dnsIp4
146
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
9->146
148
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
9->148
102
C:\Users\user\AppData\...\fd096224d5.exe, PE32
9->102
dropped
104
C:\Users\user\AppData\...\98f8ef74ec.exe, PE32
9->104
dropped
106
C:\Users\user\AppData\...\5f4a2ffa3a.exe, PE32
9->106
dropped
116
29 other malicious files
9->116
dropped
230
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
9->230
232
Hides threads from debuggers
9->232
234
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
9->234
20
ukX1YE2.exe
9->20
started
24
t0IHakP.exe
9->24
started
27
5fe60d6c80.exe
9->27
started
37
5 other processes
9->37
150
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
14->150
152
172.67.165.185
CLOUDFLARENETUS
United States
14->152
108
C:\Users\user\...\Y71AV1VIPLT8Y663WBDXSB.exe, PE32
14->108
dropped
110
C:\Users\user\...\4XVI62Q28CHMU2Y2V4F8.exe, PE32
14->110
dropped
236
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
14->236
238
Query firmware table
information (likely
to detect VMs)
14->238
240
Found many strings related
to Crypto-Wallets (likely
being stolen)
14->240
252
3 other signatures
14->252
29
Y71AV1VIPLT8Y663WBDXSB.exe
37
14->29
started
31
4XVI62Q28CHMU2Y2V4F8.exe
4
14->31
started
154
104.18.10.31
CLOUDFLARENETUS
United States
16->154
112
C:\Users\user\AppData\...\28c520debd.exe, PE32
16->112
dropped
114
C:\Users\user\...\projectspecificpro.exe, PE32+
16->114
dropped
118
12 other malicious files
16->118
dropped
242
Creates multiple autostart
registry keys
16->242
244
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
16->244
246
Detected unpacking (changes
PE section rights)
18->246
248
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
18->248
250
Tries to evade debugger
and weak emulator (self
modifying code)
18->250
33
msedge.exe
18->33
started
35
msedge.exe
18->35
started
file5
signatures6
process7
dnsIp8
84
C:\Users\user\AppData\...\soonmaintain.exe, PE32+
20->84
dropped
86
C:\Users\user\AppData\...\soonmaiintain.exe, PE32
20->86
dropped
178
Multi AV Scanner detection
for dropped file
20->178
180
Creates multiple autostart
registry keys
20->180
39
soonmaintain.exe
20->39
started
132
149.154.167.220
TELEGRAMRU
United Kingdom
24->132
134
104.16.185.241
CLOUDFLARENETUS
United States
24->134
144
2 other IPs or domains
24->144
98
5 other malicious files
24->98
dropped
182
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
24->182
184
Queries sensitive Plug
and Play Device Information
(via WMI, Win32_PnPEntity,
often done to detect
virtual machines)
24->184
196
2 other signatures
24->196
53
2 other processes
24->53
88
C:\Users\user\AppData\Local\...\axplong.exe, PE32
27->88
dropped
186
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
27->186
42
axplong.exe
27->42
started
136
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
29->136
138
127.0.0.1
unknown
unknown
29->138
90
C:\Users\user\Documents\FIJECAEHJJ.exe, PE32
29->90
dropped
92
C:\Users\user\AppData\...\softokn3[1].dll, PE32
29->92
dropped
94
C:\Users\user\AppData\Local\...\random[2].exe, PE32
29->94
dropped
100
11 other files (7 malicious)
29->100
dropped
188
Detected unpacking (changes
PE section rights)
29->188
190
Attempt to bypass Chrome
Application-Bound Encryption
29->190
192
Drops PE files to the
document folder of the
user
29->192
198
6 other signatures
29->198
44
cmd.exe
29->44
started
55
2 other processes
29->55
96
C:\Users\user\AppData\Local\...\skotes.exe, PE32
31->96
dropped
200
3 other signatures
31->200
46
skotes.exe
31->46
started
140
172.67.157.254
CLOUDFLARENETUS
United States
37->140
142
104.121.10.34
AKAMAI-ASUS
United States
37->142
194
Writes to foreign memory
regions
37->194
202
3 other signatures
37->202
48
BitLockerToGo.exe
37->48
started
51
dea82620d5.exe
37->51
started
57
3 other processes
37->57
file9
signatures10
process11
dnsIp12
222
3 other signatures
39->222
59
InstallUtil.exe
39->59
started
224
2 other signatures
42->224
204
Uses netsh to modify
the Windows network
and firewall settings
44->204
206
Tries to harvest and
steal WLAN passwords
44->206
63
FIJECAEHJJ.exe
44->63
started
65
conhost.exe
44->65
started
208
Detected unpacking (changes
PE section rights)
46->208
226
2 other signatures
46->226
120
149.154.167.99
TELEGRAMRU
United Kingdom
48->120
122
116.203.8.178
HETZNER-ASDE
Germany
48->122
210
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
48->210
212
Found many strings related
to Crypto-Wallets (likely
being stolen)
48->212
214
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
48->214
67
chrome.exe
48->67
started
69
msedge.exe
48->69
started
124
172.67.209.202
CLOUDFLARENETUS
United States
51->124
216
Query firmware table
information (likely
to detect VMs)
51->216
228
2 other signatures
51->228
71
conhost.exe
53->71
started
77
6 other processes
53->77
126
192.168.2.5
unknown
unknown
55->126
128
239.255.255.250
unknown
Reserved
55->128
218
Monitors registry run
keys for changes
55->218
73
chrome.exe
55->73
started
75
msedge.exe
55->75
started
130
172.67.150.49
CLOUDFLARENETUS
United States
57->130
220
Tries to steal Crypto
Currency Wallets
57->220
signatures13
process14
dnsIp15
156
45.89.196.115
DEDIPATH-LLCUS
Russian Federation
59->156
254
Query firmware table
information (likely
to detect VMs)
59->254
256
Tries to harvest and
steal ftp login credentials
59->256
258
Tries to harvest and
steal browser information
(history, passwords,
etc)
59->258
260
Tries to steal Crypto
Currency Wallets
59->260
262
Detected unpacking (changes
PE section rights)
63->262
264
Tries to evade debugger
and weak emulator (self
modifying code)
63->264
266
Hides threads from debuggers
63->266
268
2 other signatures
63->268
79
chrome.exe
67->79
started
82
msedge.exe
69->82
started
158
142.250.181.138
GOOGLEUS
United States
73->158
160
142.250.181.74
GOOGLEUS
United States
73->160
162
6 other IPs or domains
73->162
signatures16
process17
dnsIp18
164
142.250.181.68
GOOGLEUS
United States
79->164
166
172.217.19.10
GOOGLEUS
United States
79->166
168
3 other IPs or domains
79->168
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.