Threat name:
LummaC, PureLog Stealer, RedLine, RisePr
Alert
Classification:
troj.spyw.evad
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject threads in other processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1433513
Sample:
file.exe
Startdate:
29/04/2024
Architecture:
WINDOWS
Score:
100
97
globus-bobus.xyz
2->97
99
f.123654987.xyz
2->99
101
28 other IPs or domains
2->101
125
Snort IDS alert for
network traffic
2->125
127
Found malware configuration
2->127
129
Malicious sample detected
(through community Yara
rule)
2->129
133
17 other signatures
2->133
9
file.exe
11
60
2->9
started
14
svchost.exe
2->14
started
16
svchost.exe
2->16
started
18
svchost.exe
2->18
started
signatures3
131
Performs DNS queries
to domains with low
reputation
99->131
process4
dnsIp5
119
5.42.66.10, 49704, 49707, 80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
9->119
121
f.123654987.xyz
37.221.125.202
PTSERVIDORPT
Lithuania
9->121
123
21 other IPs or domains
9->123
77
C:\Users\...\ud1r8eWamvl8P3Cr25wSsSAO.exe, PE32
9->77
dropped
79
C:\Users\...\ruSPUf7et57EqsbFyaNdat9N.exe, PE32
9->79
dropped
81
C:\Users\...\qHsV8rgHvWt2dJQhF7mWm1OV.exe, PE32
9->81
dropped
83
32 other malicious files
9->83
dropped
171
Detected unpacking (changes
PE section rights)
9->171
173
Query firmware table
information (likely
to detect VMs)
9->173
175
Drops PE files to the
document folder of the
user
9->175
177
12 other signatures
9->177
20
G1NoUPJx_TZMIEQbze3nFHrL.exe
2
9->20
started
23
9B474RQC962NkG9UUL89e__s.exe
9->23
started
27
9tSDhQIa0Djz03H7BiK2Arn_.exe
9->27
started
29
17 other processes
9->29
file6
signatures7
process8
dnsIp9
59
C:\Users\...behaviorgraph1NoUPJx_TZMIEQbze3nFHrL.tmp, PE32
20->59
dropped
31
G1NoUPJx_TZMIEQbze3nFHrL.tmp
20->31
started
109
193.233.132.253
FREE-NET-ASFREEnetEU
Russian Federation
23->109
111
db-ip.com
104.26.4.15
CLOUDFLARENETUS
United States
23->111
61
C:\Users\user\...\Rovfucsc1ac_1X1vCVWw.exe, PE32
23->61
dropped
63
C:\Users\user\AppData\...\lumma2804[1].exe, PE32
23->63
dropped
65
C:\Users\user\...\AdobeUpdaterV202.exe, PE32
23->65
dropped
73
2 other malicious files
23->73
dropped
147
Query firmware table
information (likely
to detect VMs)
23->147
149
Tries to steal Mail
credentials (via file
/ registry access)
23->149
151
Found many strings related
to Crypto-Wallets (likely
being stolen)
23->151
167
5 other signatures
23->167
153
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
27->153
155
Writes to foreign memory
regions
27->155
157
Allocates memory in
foreign processes
27->157
159
Injects a PE file into
a foreign processes
27->159
34
RegAsm.exe
27->34
started
113
147.45.47.93
FREE-NET-ASFREEnetEU
Russian Federation
29->113
115
193.233.132.226
FREE-NET-ASFREEnetEU
Russian Federation
29->115
117
d68kcn56pzfb4.cloudfront.net
18.160.227.140
MIT-GATEWAYSUS
United States
29->117
67
C:\Users\user\AppData\Local\...\INetC.dll, PE32
29->67
dropped
69
C:\Users\user\AppData\...\Protect544cd51a.dll, PE32
29->69
dropped
71
C:\Users\user\AppData\...\PowerExpertNT.exe, PE32
29->71
dropped
75
7 other malicious files
29->75
dropped
161
Multi AV Scanner detection
for dropped file
29->161
163
Detected unpacking (changes
PE section rights)
29->163
165
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
29->165
169
9 other signatures
29->169
38
cmd.exe
29->38
started
40
RegAsm.exe
29->40
started
42
Install.exe
29->42
started
44
8 other processes
29->44
file10
signatures11
process12
dnsIp13
85
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
31->85
dropped
87
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
31->87
dropped
89
C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32
31->89
dropped
95
34 other files (23 malicious)
31->95
dropped
103
37.27.87.155
UNINETAZ
Iran (ISLAMIC Republic Of)
34->103
105
steamcommunity.com
23.210.138.105
AKAMAI-ASUS
United States
34->105
91
C:\Users\user\AppData\Local\...\sqln[1].dll, PE32
34->91
dropped
135
Installs new ROOT certificates
34->135
137
Found many strings related
to Crypto-Wallets (likely
being stolen)
34->137
139
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
34->139
141
Tries to harvest and
steal browser information
(history, passwords,
etc)
34->141
143
Suspicious powershell
command line found
38->143
145
Tries to download and
execute files (via powershell)
38->145
46
powershell.exe
38->46
started
49
conhost.exe
38->49
started
107
5.42.65.96
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
40->107
93
C:\Users\user\AppData\Local\...\Install.exe, PE32
42->93
dropped
51
conhost.exe
44->51
started
53
conhost.exe
44->53
started
55
conhost.exe
44->55
started
57
4 other processes
44->57
file14
signatures15
process16
signatures17
179
Installs new ROOT certificates
46->179
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.