Threat name:
LummaC, Amadey, Cryptbot, PureLog Steale
Alert
Classification:
rans.troj.spyw.evad
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Searches for specific processes (likely to inject)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys stealer DLL
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1497806
Sample:
surp.exe
Startdate:
23/08/2024
Architecture:
WINDOWS
Score:
100
131
jSbXVBiItIINfreBHvLPHxDRe.jSbXVBiItIINfreBHvLPHxDRe
2->131
133
fivexx5ht.top
2->133
135
3 other IPs or domains
2->135
151
Multi AV Scanner detection
for domain / URL
2->151
153
Suricata IDS alerts
for network traffic
2->153
155
Found malware configuration
2->155
157
29 other signatures
2->157
11
axplong.exe
43
2->11
started
16
surp.exe
5
2->16
started
18
axplong.exe
2->18
started
20
wscript.exe
2->20
started
signatures3
process4
dnsIp5
143
185.215.113.16, 49712, 49713, 49715
WHOLESALECONNECTIONSNL
Portugal
11->143
145
stagingbyvdveen.com
147.45.178.123, 49716, 80
FREE-NET-ASFREEnetEU
Russian Federation
11->145
119
C:\Users\user\AppData\...\LummaC22222.exe, PE32
11->119
dropped
121
C:\Users\user\AppData\Local\...\Indentif.exe, PE32+
11->121
dropped
123
C:\Users\user\AppData\...\coreplugin.exe, PE32
11->123
dropped
129
17 other malicious files
11->129
dropped
209
Hides threads from debuggers
11->209
211
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->211
213
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->213
22
BattleGermany.exe
11->22
started
26
stealc_default.exe
11->26
started
29
crypteda.exe
1
11->29
started
33
5 other processes
11->33
125
C:\Users\user\AppData\Local\...\axplong.exe, PE32
16->125
dropped
127
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
16->127
dropped
215
Detected unpacking (changes
PE section rights)
16->215
217
Tries to evade debugger
and weak emulator (self
modifying code)
16->217
219
Tries to detect virtualization
through RDTSC time measurements
16->219
31
axplong.exe
16->31
started
file6
signatures7
process8
dnsIp9
101
C:\Users\user\AppData\Local\Temp\Tracked, data
22->101
dropped
113
7 other malicious files
22->113
dropped
183
Multi AV Scanner detection
for dropped file
22->183
185
Writes many files with
high entropy
22->185
35
cmd.exe
22->35
started
137
185.215.113.17, 49728, 80
WHOLESALECONNECTIONSNL
Portugal
26->137
103
C:\Users\user\AppData\...\softokn3[1].dll, PE32
26->103
dropped
105
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
26->105
dropped
107
C:\Users\user\AppData\...\mozglue[1].dll, PE32
26->107
dropped
115
9 other files (5 malicious)
26->115
dropped
187
Tries to steal Mail
credentials (via file
/ registry access)
26->187
189
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->189
203
6 other signatures
26->203
191
Machine Learning detection
for dropped file
29->191
205
3 other signatures
29->205
39
RegAsm.exe
3
29->39
started
41
RegAsm.exe
29->41
started
193
Detected unpacking (changes
PE section rights)
31->193
195
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
31->195
207
4 other signatures
31->207
139
185.215.113.67, 21405, 49733
WHOLESALECONNECTIONSNL
Portugal
33->139
141
fivexx5ht.top
195.133.48.136
MTW-ASRU
Russian Federation
33->141
109
C:\Users\user\AppData\Local\Temp\Zinc, data
33->109
dropped
111
C:\Users\user\AppData\Local\Temp\Template, data
33->111
dropped
117
13 other malicious files
33->117
dropped
197
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
33->197
199
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
33->199
201
Contains functionality
to inject code into
remote processes
33->201
43
RegAsm.exe
1
18
33->43
started
46
cmd.exe
33->46
started
48
cmd.exe
33->48
started
50
2 other processes
33->50
file10
signatures11
process12
dnsIp13
85
C:\Users\user\AppData\Local\...\Community.pif, PE32
35->85
dropped
159
Drops PE files with
a suspicious file extension
35->159
161
Uses schtasks.exe or
at.exe to add and modify
task schedules
35->161
163
Writes many files with
high entropy
35->163
52
Community.pif
35->52
started
56
cmd.exe
35->56
started
58
conhost.exe
35->58
started
69
7 other processes
35->69
87
C:\Users\user\AppData\...\zWVAV1zdYD.exe, PE32
39->87
dropped
89
C:\Users\user\AppData\...\H2eLPwLglk.exe, PE32
39->89
dropped
165
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->165
60
H2eLPwLglk.exe
39->60
started
63
zWVAV1zdYD.exe
39->63
started
147
95.179.163.21, 29257, 49714, 49722
AS-CHOOPAUS
Netherlands
43->147
167
Installs new ROOT certificates
43->167
91
C:\Users\user\AppData\Local\...\Cultures.pif, PE32
46->91
dropped
65
conhost.exe
46->65
started
67
conhost.exe
48->67
started
71
4 other processes
48->71
file14
signatures15
process16
dnsIp17
93
C:\Users\user\AppData\Local\...\SkyPilot.pif, PE32
52->93
dropped
95
C:\Users\user\AppData\Local\...\SkyPilot.js, ASCII
52->95
dropped
97
C:\Users\user\AppData\Local\...\D, data
52->97
dropped
169
Drops PE files with
a suspicious file extension
52->169
171
Writes many files with
high entropy
52->171
73
cmd.exe
52->73
started
75
schtasks.exe
52->75
started
99
C:\Users\user\AppData\Local\Temp\177479\s, data
56->99
dropped
149
65.21.18.51, 45580, 49720
CP-ASDE
United States
60->149
173
Multi AV Scanner detection
for dropped file
60->173
175
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
60->175
177
Found many strings related
to Crypto-Wallets (likely
being stolen)
60->177
181
2 other signatures
60->181
179
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
63->179
77
conhost.exe
63->77
started
file18
signatures19
process20
process21
79
conhost.exe
73->79
started
81
schtasks.exe
73->81
started
83
conhost.exe
75->83
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.