Threat name:
LummaC, Amadey, LummaC Stealer, RedLine
Alert
Classification:
troj.spyw.evad
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Creates files in the system32 config directory
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Encrypted powershell cmdline option found
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1580355
Sample:
cMTqzvmx9u.exe
Startdate:
24/12/2024
Architecture:
WINDOWS
Score:
100
140
Found malware configuration
2->140
142
Malicious sample detected
(through community Yara
rule)
2->142
144
Antivirus detection
for dropped file
2->144
146
15 other signatures
2->146
8
skotes.exe
4
67
2->8
started
13
cMTqzvmx9u.exe
5
2->13
started
15
skotes.exe
2->15
started
17
4 other processes
2->17
process3
dnsIp4
130
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
8->130
132
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
8->132
134
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
8->134
88
C:\Users\user\AppData\...\aa8c9de034.exe, PE32+
8->88
dropped
90
C:\Users\user\AppData\...\f53b3c5fe2.exe, PE32
8->90
dropped
92
C:\Users\user\AppData\...\91732ff836.exe, PE32
8->92
dropped
98
27 other malicious files
8->98
dropped
184
Creates multiple autostart
registry keys
8->184
186
Hides threads from debuggers
8->186
188
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
8->188
19
e6e4c20fad.exe
8->19
started
24
0a7e8af92e.exe
8->24
started
26
b9ba85c997.exe
8->26
started
32
8 other processes
8->32
94
C:\Users\user\AppData\Local\...\skotes.exe, PE32
13->94
dropped
96
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
13->96
dropped
190
Detected unpacking (changes
PE section rights)
13->190
192
Tries to evade debugger
and weak emulator (self
modifying code)
13->192
194
Tries to detect virtualization
through RDTSC time measurements
13->194
28
skotes.exe
13->28
started
196
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
15->196
136
23.218.208.109
AS6453US
United States
17->136
138
127.0.0.1
unknown
unknown
17->138
198
Creates files in the
system32 config directory
17->198
200
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->200
30
firefox.exe
17->30
started
file5
signatures6
process7
dnsIp8
110
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
19->110
70
C:\Users\user\AppData\...\softokn3[1].dll, PE32
19->70
dropped
72
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
19->72
dropped
86
10 other files (6 malicious)
19->86
dropped
148
Attempt to bypass Chrome
Application-Bound Encryption
19->148
168
6 other signatures
19->168
34
chrome.exe
19->34
started
74
C:\Users\user\AppData\Roaming\...\DJj.exe, PE32
24->74
dropped
150
Multi AV Scanner detection
for dropped file
24->150
152
Suspicious powershell
command line found
24->152
154
Encrypted powershell
cmdline option found
24->154
37
DJj.exe
24->37
started
40
powershell.exe
24->40
started
76
C:\Users\user\...\MZHUJDVAZFQBUC9CQYK.exe, PE32
26->76
dropped
78
C:\Users\...8X4KAZW48ZU3YY0Y4JPME949S3Q.exe, PE32
26->78
dropped
156
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
26->156
158
Query firmware table
information (likely
to detect VMs)
26->158
160
Tries to evade debugger
and weak emulator (self
modifying code)
26->160
162
Detected unpacking (changes
PE section rights)
28->162
170
2 other signatures
28->170
112
18.66.161.98
MIT-GATEWAYSUS
United States
30->112
114
142.250.181.110
GOOGLEUS
United States
30->114
120
13 other IPs or domains
30->120
80
C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+
30->80
dropped
82
C:\Users\user\...\gmpopenh264.dll (copy), PE32+
30->82
dropped
42
firefox.exe
30->42
started
116
149.154.167.220
TELEGRAMRU
United Kingdom
32->116
118
142.250.181.1
GOOGLEUS
United States
32->118
122
8 other IPs or domains
32->122
84
C:\Program Files\...\graph.exe, PE32+
32->84
dropped
164
Binary is likely a compiled
AutoIt script file
32->164
166
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
32->166
172
9 other signatures
32->172
44
WerFault.exe
32->44
started
47
7ddd2a748c.exe
32->47
started
49
taskkill.exe
32->49
started
51
7 other processes
32->51
file9
signatures10
process11
dnsIp12
102
239.255.255.250
unknown
Reserved
34->102
53
chrome.exe
34->53
started
104
147.45.44.224
FREE-NET-ASFREEnetEU
Russian Federation
37->104
174
Multi AV Scanner detection
for dropped file
37->174
176
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
37->176
178
Found many strings related
to Crypto-Wallets (likely
being stolen)
37->178
182
3 other signatures
37->182
180
Loading BitLocker PowerShell
Module
40->180
56
conhost.exe
40->56
started
58
WmiPrvSE.exe
40->58
started
106
104.208.16.94
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
44->106
100
C:\ProgramData\Microsoft\...\Report.wer, Unicode
44->100
dropped
108
172.67.209.202
CLOUDFLARENETUS
United States
47->108
60
conhost.exe
49->60
started
62
conhost.exe
51->62
started
64
conhost.exe
51->64
started
66
conhost.exe
51->66
started
68
conhost.exe
51->68
started
file13
signatures14
process15
dnsIp16
124
142.250.181.68
GOOGLEUS
United States
53->124
126
172.217.19.227
GOOGLEUS
United States
53->126
128
3 other IPs or domains
53->128
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.