Threat name:
LummaC, Amadey, Fabookie, Glupteba, Pure
Alert
Classification:
phis.troj.adwa.spyw.evad
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops PE files to the startup folder
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites Mozilla Firefox settings
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1387584
Sample:
SecuriteInfo.com.Win32.PWSX...
Startdate:
06/02/2024
Architecture:
WINDOWS
Score:
100
128
secretionsuitcasenioise.shop
2->128
130
mealroomrallpassiveer.shop
2->130
132
5 other IPs or domains
2->132
188
Snort IDS alert for
network traffic
2->188
190
Multi AV Scanner detection
for domain / URL
2->190
192
Found malware configuration
2->192
194
22 other signatures
2->194
11
explorgu.exe
39
2->11
started
16
SecuriteInfo.com.Win32.PWSX-gen.17762.9680.exe
5
2->16
started
18
qemu-ga.exe
2->18
started
signatures3
process4
dnsIp5
138
185.215.113.32, 49699, 49700, 49702
WHOLESALECONNECTIONSNL
Portugal
11->138
140
109.107.182.3, 49705, 49719, 49722
TELEPORT-TV-ASRU
Russian Federation
11->140
142
2 other IPs or domains
11->142
118
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
11->118
dropped
120
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
11->120
dropped
122
C:\Users\user\AppData\Local\Temp\...\alex.exe, PE32
11->122
dropped
126
15 other malicious files
11->126
dropped
234
Multi AV Scanner detection
for dropped file
11->234
236
Detected unpacking (changes
PE section rights)
11->236
238
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
11->238
246
4 other signatures
11->246
20
dayroc.exe
11->20
started
24
alex.exe
11->24
started
26
Goldprime.exe
2
11->26
started
28
6 other processes
11->28
124
C:\Users\user\AppData\Local\...\explorgu.exe, PE32
16->124
dropped
240
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
16->240
242
Tries to evade debugger
and weak emulator (self
modifying code)
16->242
244
Tries to detect virtualization
through RDTSC time measurements
16->244
file6
signatures7
process8
dnsIp9
100
C:\Users\user\AppData\Local\...\toolspub1.exe, PE32
20->100
dropped
102
C:\Users\user\AppData\Local\Temp\rty25.exe, PE32+
20->102
dropped
104
C:\...\d21cbe21e38b385a41a68c5e6dd32f4c.exe, PE32
20->104
dropped
106
C:\Users\user\...\InstallSetup_nine.exe, PE32
20->106
dropped
196
Multi AV Scanner detection
for dropped file
20->196
31
InstallSetup_nine.exe
20->31
started
36
d21cbe21e38b385a41a68c5e6dd32f4c.exe
20->36
started
38
toolspub1.exe
20->38
started
40
rty25.exe
20->40
started
198
Writes to foreign memory
regions
24->198
200
Allocates memory in
foreign processes
24->200
202
Injects a PE file into
a foreign processes
24->202
42
RegAsm.exe
24->42
started
204
Contains functionality
to inject code into
remote processes
26->204
44
RegAsm.exe
26->44
started
46
conhost.exe
26->46
started
144
80.79.4.61
SISTEMEMD
Moldova Republic of
28->144
146
45.15.156.209, 40481, 49727
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
28->146
206
System process connects
to network (likely due
to code injection or
exploit)
28->206
208
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
28->208
210
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
28->210
212
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
28->212
48
rundll32.exe
25
28->48
started
50
3 other processes
28->50
file10
signatures11
process12
dnsIp13
148
185.172.128.109
NADYMSS-ASRU
Russian Federation
31->148
158
2 other IPs or domains
31->158
88
C:\Users\user\AppData\Local\Temp\u4ik.1.exe, PE32
31->88
dropped
90
C:\Users\user\AppData\Local\Temp\u4ik.0.exe, PE32
31->90
dropped
162
Multi AV Scanner detection
for dropped file
31->162
164
Detected unpacking (changes
PE section rights)
31->164
166
Detected unpacking (overwrites
its own PE header)
31->166
52
u4ik.0.exe
31->52
started
57
u4ik.1.exe
31->57
started
180
2 other signatures
36->180
59
powershell.exe
36->59
started
182
2 other signatures
38->182
61
WerFault.exe
38->61
started
150
i.alie3ksgaa.com
154.92.15.189
HKKFGL-AS-APHKKwaifongGroupLimitedHK
Seychelles
40->150
92
C:\Users\...\9e7e4f01f5c4412e63ed4e2e5d935ff5, SQLite
40->92
dropped
168
Detected unpacking (creates
a PE file in dynamic
memory)
40->168
170
Tries to harvest and
steal browser information
(history, passwords,
etc)
40->170
94
C:\Users\user\AppData\Roaming\...\olehps.exe, PE32
42->94
dropped
96
C:\Users\user\AppData\Roaming\...\Logs.exe, PE32
42->96
dropped
63
Logs.exe
42->63
started
65
olehps.exe
42->65
started
152
20.79.30.95, 33223, 49708
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
44->152
172
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
44->172
174
Found many strings related
to Crypto-Wallets (likely
being stolen)
44->174
184
2 other signatures
44->184
176
Tries to steal Instant
Messenger accounts or
passwords
48->176
186
3 other signatures
48->186
67
powershell.exe
48->67
started
69
netsh.exe
2
48->69
started
154
144.76.1.85, 18574, 49720
HETZNER-ASDE
Germany
50->154
156
secretionsuitcasenioise.shop
104.21.16.152, 443, 49728
CLOUDFLARENETUS
United States
50->156
160
4 other IPs or domains
50->160
98
C:\Users\user\AppData\Roaming\...\qemu-ga.exe, PE32
50->98
dropped
178
LummaC encrypted strings
found
50->178
71
2 other processes
50->71
file14
signatures15
process16
dnsIp17
134
185.172.128.79
NADYMSS-ASRU
Russian Federation
52->134
108
C:\Users\user\AppData\...\softokn3[1].dll, PE32
52->108
dropped
110
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
52->110
dropped
112
C:\Users\user\AppData\...\mozglue[1].dll, PE32
52->112
dropped
116
9 other files (1 malicious)
52->116
dropped
214
Detected unpacking (changes
PE section rights)
52->214
216
Detected unpacking (overwrites
its own PE header)
52->216
218
Tries to steal Mail
credentials (via file
/ registry access)
52->218
230
4 other signatures
52->230
73
cmd.exe
57->73
started
76
conhost.exe
59->76
started
136
5.42.65.31
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
63->136
220
Multi AV Scanner detection
for dropped file
63->220
222
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
63->222
224
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
63->224
114
C:\Users\user\...\246122658369_Desktop.zip, Zip
67->114
dropped
226
Found many strings related
to Crypto-Wallets (likely
being stolen)
67->226
78
conhost.exe
67->78
started
80
conhost.exe
69->80
started
228
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
71->228
file18
signatures19
process20
signatures21
232
Uses schtasks.exe or
at.exe to add and modify
task schedules
73->232
82
conhost.exe
73->82
started
84
chcp.com
73->84
started
86
schtasks.exe
73->86
started
process22
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.