Threat name:
PureCrypter, LummaC, Amadey, LummaC Stea
Alert
Classification:
troj.spyw.evad
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected PureCrypter Trojan
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
LummaC encrypted strings found
Machine Learning detection for sample
Modifies windows update settings
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
Yara detected WhiteSnake Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1545821
Sample:
file.exe
Startdate:
31/10/2024
Architecture:
WINDOWS
Score:
100
111
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
2->111
113
thumbystriw.store
2->113
115
23 other IPs or domains
2->115
143
Suricata IDS alerts
for network traffic
2->143
145
Found malware configuration
2->145
147
Antivirus detection
for URL or domain
2->147
149
21 other signatures
2->149
10
axplong.exe
2
22
2->10
started
15
file.exe
5
2->15
started
17
62dceeab4d.exe
2->17
started
19
6 other processes
2->19
signatures3
process4
dnsIp5
133
185.215.113.16, 58379, 58380, 58383
WHOLESALECONNECTIONSNL
Portugal
10->133
99
C:\Users\user\AppData\...\62dceeab4d.exe, PE32
10->99
dropped
101
C:\Users\user\AppData\...\f99547c8e6.exe, PE32
10->101
dropped
103
C:\Users\user\AppData\Local\...\Final.exe, PE32
10->103
dropped
109
3 other malicious files
10->109
dropped
211
Creates multiple autostart
registry keys
10->211
213
Hides threads from debuggers
10->213
215
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
10->215
21
62dceeab4d.exe
10->21
started
26
f99547c8e6.exe
10->26
started
28
Final.exe
3
10->28
started
105
C:\Users\user\AppData\Local\...\axplong.exe, PE32
15->105
dropped
107
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
15->107
dropped
217
Detected unpacking (changes
PE section rights)
15->217
219
Tries to evade debugger
and weak emulator (self
modifying code)
15->219
221
Tries to detect virtualization
through RDTSC time measurements
15->221
30
axplong.exe
15->30
started
223
Query firmware table
information (likely
to detect VMs)
17->223
225
Tries to harvest and
steal ftp login credentials
17->225
227
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->227
229
Detected PureCrypter
Trojan
17->229
231
Tries to steal Crypto
Currency Wallets
19->231
233
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
19->233
32
msedge.exe
19->32
started
34
msedge.exe
19->34
started
36
msedge.exe
19->36
started
38
msedge.exe
19->38
started
file6
signatures7
process8
dnsIp9
117
necklacedmny.store
188.114.96.3
CLOUDFLARENETUS
European Union
21->117
83
C:\Users\user\...\VGX14DCMPTTJ4O2LPZ4N.exe, PE32
21->83
dropped
85
C:\Users\...\V30AHCO282KY2KV83OC4RNYNX.exe, PE32
21->85
dropped
163
Multi AV Scanner detection
for dropped file
21->163
165
Detected unpacking (changes
PE section rights)
21->165
167
Query firmware table
information (likely
to detect VMs)
21->167
181
5 other signatures
21->181
40
V30AHCO282KY2KV83OC4RNYNX.exe
21->40
started
44
VGX14DCMPTTJ4O2LPZ4N.exe
21->44
started
119
185.215.113.206
WHOLESALECONNECTIONSNL
Portugal
26->119
121
127.0.0.1
unknown
unknown
26->121
87
C:\Users\user\AppData\...\softokn3[1].dll, PE32
26->87
dropped
89
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
26->89
dropped
91
C:\Users\user\AppData\...\mozglue[1].dll, PE32
26->91
dropped
95
10 other files (2 malicious)
26->95
dropped
169
Tries to steal Mail
credentials (via file
/ registry access)
26->169
171
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->171
173
Tries to harvest and
steal ftp login credentials
26->173
183
2 other signatures
26->183
46
chrome.exe
26->46
started
49
msedge.exe
26->49
started
93
C:\Users\user\AppData\Local\Temp\build.exe, PE32
28->93
dropped
51
build.exe
14
6
28->51
started
175
Tries to evade debugger
and weak emulator (self
modifying code)
30->175
177
Hides threads from debuggers
30->177
179
Potentially malicious
time measurement code
found
30->179
123
23.55.178.220
NTT-COMMUNICATIONS-2914US
United States
32->123
125
13.107.246.57
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
32->125
127
21 other IPs or domains
32->127
file10
signatures11
process12
dnsIp13
97
C:\Users\user\AppData\Local\...\skotes.exe, PE32
40->97
dropped
185
Detected unpacking (changes
PE section rights)
40->185
187
Tries to evade debugger
and weak emulator (self
modifying code)
40->187
189
Hides threads from debuggers
40->189
207
2 other signatures
40->207
53
skotes.exe
40->53
started
191
Modifies windows update
settings
44->191
193
Disables Windows Defender
Tamper protection
44->193
195
Disable Windows Defender
notifications (registry)
44->195
197
Disable Windows Defender
real time protection
(registry)
44->197
135
192.168.2.5, 443, 49703, 49704
unknown
unknown
46->135
137
239.255.255.250
unknown
Reserved
46->137
56
chrome.exe
46->56
started
59
chrome.exe
46->59
started
199
Monitors registry run
keys for changes
49->199
61
msedge.exe
49->61
started
139
41.216.183.9, 58382, 8080
AS40676US
South Africa
51->139
141
ip-api.com
208.95.112.1, 58381, 80
TUT-ASUS
United States
51->141
201
Multi AV Scanner detection
for dropped file
51->201
203
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
51->203
205
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
51->205
209
4 other signatures
51->209
63
cmd.exe
1
51->63
started
65
cmd.exe
51->65
started
file14
signatures15
process16
dnsIp17
151
Detected unpacking (changes
PE section rights)
53->151
153
Tries to evade debugger
and weak emulator (self
modifying code)
53->153
155
Hides threads from debuggers
53->155
161
2 other signatures
53->161
129
www.google.com
142.250.185.100
GOOGLEUS
United States
56->129
131
216.58.206.36
GOOGLEUS
United States
59->131
157
Uses netsh to modify
the Windows network
and firewall settings
63->157
159
Tries to harvest and
steal WLAN passwords
63->159
67
netsh.exe
2
63->67
started
69
conhost.exe
63->69
started
71
chcp.com
1
63->71
started
73
findstr.exe
63->73
started
75
conhost.exe
65->75
started
77
chcp.com
65->77
started
79
netsh.exe
65->79
started
81
findstr.exe
65->81
started
signatures18
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.