Threat name:
LummaC, Amadey, LummaC Stealer, Stealc,
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains very large array initializations
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to start a terminal service
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to resolve many domain names, but no domain seems valid
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1549825
Sample:
file.exe
Startdate:
06/11/2024
Architecture:
WINDOWS
Score:
100
106
thighpecr.cyou
2->106
108
strikebripm.sbs
2->108
110
25 other IPs or domains
2->110
124
Multi AV Scanner detection
for domain / URL
2->124
126
Suricata IDS alerts
for network traffic
2->126
128
Found malware configuration
2->128
130
25 other signatures
2->130
11
axplong.exe
2
50
2->11
started
16
file.exe
5
2->16
started
18
axplong.exe
2->18
started
20
2 other processes
2->20
signatures3
process4
dnsIp5
120
185.215.113.16, 49976, 49978, 49980
WHOLESALECONNECTIONSNL
Portugal
11->120
122
185.215.113.36, 49979, 49981, 49983
WHOLESALECONNECTIONSNL
Portugal
11->122
94
C:\Users\user\AppData\...\f4c80429b5.exe, PE32
11->94
dropped
96
C:\Users\user\AppData\...\4eab7e0c28.exe, PE32
11->96
dropped
98
C:\Users\user\AppData\Local\...\jb4w5s2l.exe, PE32
11->98
dropped
104
21 other malicious files
11->104
dropped
168
Creates multiple autostart
registry keys
11->168
170
Hides threads from debuggers
11->170
172
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->172
22
stealc_default2.exe
34
11->22
started
27
95cd0e4b6a.exe
11->27
started
29
splwow64.exe
11->29
started
35
7 other processes
11->35
100
C:\Users\user\AppData\Local\...\axplong.exe, PE32
16->100
dropped
102
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
16->102
dropped
174
Detected unpacking (changes
PE section rights)
16->174
176
Tries to evade debugger
and weak emulator (self
modifying code)
16->176
178
Tries to detect virtualization
through RDTSC time measurements
16->178
31
axplong.exe
16->31
started
180
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
18->180
182
Contains functionality
to start a terminal
service
20->182
184
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
20->184
33
EcoCraft.scr
20->33
started
file6
signatures7
process8
dnsIp9
114
185.215.113.17, 49977, 80
WHOLESALECONNECTIONSNL
Portugal
22->114
78
C:\Users\user\AppData\...\softokn3[1].dll, PE32
22->78
dropped
80
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
22->80
dropped
82
C:\Users\user\AppData\...\mozglue[1].dll, PE32
22->82
dropped
90
9 other files (5 malicious)
22->90
dropped
142
Antivirus detection
for dropped file
22->142
144
Multi AV Scanner detection
for dropped file
22->144
146
Tries to steal Mail
credentials (via file
/ registry access)
22->146
162
7 other signatures
22->162
84
C:\ProgramData\ogriIqEF\Application.exe, PE32
27->84
dropped
86
C:\Users\user\AppData\...\ogriIqEF.url, MS
27->86
dropped
148
Contains functionality
to start a terminal
service
27->148
150
Writes to foreign memory
regions
27->150
152
Injects a PE file into
a foreign processes
27->152
37
AppLaunch.exe
27->37
started
41
AppLaunch.exe
27->41
started
43
cmd.exe
29->43
started
154
Detected unpacking (changes
PE section rights)
31->154
156
Tries to evade debugger
and weak emulator (self
modifying code)
31->156
164
3 other signatures
31->164
116
founpiuer.store
104.21.5.155
CLOUDFLARENETUS
United States
35->116
118
steamcommunity.com
104.102.49.254, 443, 49987
AKAMAI-ASUS
United States
35->118
88
C:\Users\user\AppData\Local\...behaviorgraphxtuum.exe, PE32
35->88
dropped
158
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
35->158
160
Machine Learning detection
for dropped file
35->160
166
2 other signatures
35->166
46
Gxtuum.exe
12
35->46
started
48
conhost.exe
35->48
started
50
conhost.exe
35->50
started
52
8 other processes
35->52
file10
signatures11
process12
dnsIp13
112
185.215.113.217
WHOLESALECONNECTIONSNL
Portugal
37->112
92
C:\Users\user\AppData\...\Jurisdiction.pif, PE32
43->92
dropped
132
Drops PE files with
a suspicious file extension
43->132
134
Uses schtasks.exe or
at.exe to add and modify
task schedules
43->134
54
Jurisdiction.pif
43->54
started
58
conhost.exe
43->58
started
60
tasklist.exe
43->60
started
62
7 other processes
43->62
136
Multi AV Scanner detection
for dropped file
46->136
138
Contains functionality
to start a terminal
service
46->138
file14
signatures15
process16
file17
74
C:\Users\user\AppData\Local\...coCraft.scr, PE32
54->74
dropped
76
C:\Users\user\AppData\Local\...coCraft.js, ASCII
54->76
dropped
140
Drops PE files with
a suspicious file extension
54->140
64
cmd.exe
54->64
started
66
cmd.exe
54->66
started
signatures18
process19
process20
68
conhost.exe
64->68
started
70
schtasks.exe
64->70
started
72
conhost.exe
66->72
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.