Threat name:
LummaC, Amadey, Credential Flusher, Lumm
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops VBS files to the startup folder
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected Powershell download and execute
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1547313
Sample:
file.exe
Startdate:
02/11/2024
Architecture:
WINDOWS
Score:
100
98
thumbystriw.store
2->98
100
presticitpo.store
2->100
102
23 other IPs or domains
2->102
126
Suricata IDS alerts
for network traffic
2->126
128
Found malware configuration
2->128
130
Antivirus detection
for dropped file
2->130
132
22 other signatures
2->132
9
skotes.exe
4
28
2->9
started
14
file.exe
5
2->14
started
16
skotes.exe
2->16
started
18
3 other processes
2->18
signatures3
process4
dnsIp5
120
185.215.113.43, 63773, 63787, 63813
WHOLESALECONNECTIONSNL
Portugal
9->120
122
185.215.113.16, 63819, 63862, 63898
WHOLESALECONNECTIONSNL
Portugal
9->122
124
wasni.care
208.109.77.116, 63794, 63806, 80
SUCURI-SECUS
United States
9->124
86
C:\Users\user\AppData\...\8a0ff7e068.exe, PE32
9->86
dropped
88
C:\Users\user\AppData\...\203f60e481.exe, PE32
9->88
dropped
90
C:\Users\user\AppData\...\0d8313073f.exe, PE32
9->90
dropped
96
7 other malicious files
9->96
dropped
170
Creates multiple autostart
registry keys
9->170
172
Hides threads from debuggers
9->172
174
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
9->174
20
24da741fb6.exe
9->20
started
25
0d8313073f.exe
9->25
started
27
8a0ff7e068.exe
9->27
started
33
2 other processes
9->33
92
C:\Users\user\AppData\Local\...\skotes.exe, PE32
14->92
dropped
94
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
14->94
dropped
176
Detected unpacking (changes
PE section rights)
14->176
178
Tries to evade debugger
and weak emulator (self
modifying code)
14->178
180
Tries to detect virtualization
through RDTSC time measurements
14->180
182
Potentially malicious
time measurement code
found
14->182
29
skotes.exe
14->29
started
184
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
16->184
186
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
18->186
31
firefox.exe
18->31
started
file6
signatures7
process8
dnsIp9
104
necklacedmny.store
188.114.96.3, 443, 63854, 63867
CLOUDFLARENETUS
European Union
20->104
72
C:\Users\...\33QCBA038D3K2VF7AVBGWF5K.exe, PE32
20->72
dropped
144
Antivirus detection
for dropped file
20->144
146
Multi AV Scanner detection
for dropped file
20->146
148
Query firmware table
information (likely
to detect VMs)
20->148
162
4 other signatures
20->162
35
33QCBA038D3K2VF7AVBGWF5K.exe
20->35
started
106
185.215.113.206, 63908, 80
WHOLESALECONNECTIONSNL
Portugal
25->106
74
C:\Users\user\AppData\...\msvcp140[1].dll, PE32
25->74
dropped
76
C:\Users\user\AppData\...\mozglue[1].dll, PE32
25->76
dropped
78
C:\Users\user\AppData\...\freebl3[1].dll, PE32
25->78
dropped
84
4 other malicious files
25->84
dropped
150
Detected unpacking (changes
PE section rights)
25->150
152
Attempt to bypass Chrome
Application-Bound Encryption
25->152
154
Machine Learning detection
for dropped file
25->154
38
chrome.exe
25->38
started
164
5 other signatures
27->164
166
3 other signatures
29->166
108
youtube.com
142.250.186.110
GOOGLEUS
United States
31->108
110
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
GOOGLEUS
United States
31->110
112
5 other IPs or domains
31->112
41
firefox.exe
31->41
started
43
firefox.exe
31->43
started
80
C:\Users\user\AppData\Roaming\DiagTrack.exe, PE32
33->80
dropped
82
C:\Users\user\AppData\...\DiagTrack.vbs, ASCII
33->82
dropped
156
Binary is likely a compiled
AutoIt script file
33->156
158
Found many strings related
to Crypto-Wallets (likely
being stolen)
33->158
160
Drops VBS files to the
startup folder
33->160
168
3 other signatures
33->168
45
powershell.exe
23
33->45
started
47
taskkill.exe
33->47
started
49
MSBuild.exe
33->49
started
51
5 other processes
33->51
file10
signatures11
process12
dnsIp13
134
Multi AV Scanner detection
for dropped file
35->134
136
Detected unpacking (changes
PE section rights)
35->136
138
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
35->138
142
5 other signatures
35->142
116
192.168.2.4, 443, 49723, 49724
unknown
unknown
38->116
118
239.255.255.250
unknown
Reserved
38->118
53
chrome.exe
38->53
started
140
Loading BitLocker PowerShell
Module
45->140
56
conhost.exe
45->56
started
58
WmiPrvSE.exe
45->58
started
60
conhost.exe
47->60
started
62
WerFault.exe
49->62
started
64
conhost.exe
51->64
started
66
conhost.exe
51->66
started
68
conhost.exe
51->68
started
70
conhost.exe
51->70
started
signatures14
process15
dnsIp16
114
www.google.com
216.58.212.164
GOOGLEUS
United States
53->114
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.