Threat name:
Blank Grabber, Umbral Stealer, Xmrig
Alert
Classification:
troj.adwa.spyw.evad.mine
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Detected unpacking (changes PE section rights)
Drops PE files to the startup folder
Drops PE files with a suspicious file extension
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Hijacks the control flow in another process
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Stop EventLog
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Uses attrib.exe to hide files
Uses ping.exe to check the status of other devices and networks
Uses powercfg.exe to modify the power settings
Yara detected Blank Grabber
Yara detected Umbral Stealer
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1796365
Sample:
Loader.exe
Startdate:
16/10/2025
Architecture:
WINDOWS
Score:
100
94
pastebin.com
2->94
96
pool.hashvault.pro
2->96
98
3 other IPs or domains
2->98
124
Suricata IDS alerts
for network traffic
2->124
126
Found malware configuration
2->126
128
Malicious sample detected
(through community Yara
rule)
2->128
132
19 other signatures
2->132
9
Loader.exe
14
7
2->9
started
14
tc5e4ek38kh4.exe
2->14
started
signatures3
130
Connects to a pastebin
service (likely for
C&C)
94->130
process4
dnsIp5
100
gitlab.com
172.65.251.78, 443, 49690
CLOUDFLARENETUS
United States
9->100
76
C:\Users\user\AppData\Local\Temp\cheat.exe, PE32
9->76
dropped
78
C:\Users\user\AppData\Local\...\bypasser.exe, PE32+
9->78
dropped
80
C:\Users\user\AppData\...\Loader.exe.log, CSV
9->80
dropped
134
Detected unpacking (changes
PE section rights)
9->134
136
Query firmware table
information (likely
to detect VMs)
9->136
138
Hides threads from debuggers
9->138
146
3 other signatures
9->146
16
cheat.exe
16
12
9->16
started
21
bypasser.exe
1
2
9->21
started
23
conhost.exe
9->23
started
82
C:\Windows\Temp\ewhfyqrhqwxw.sys, PE32+
14->82
dropped
140
Multi AV Scanner detection
for dropped file
14->140
142
Hijacks the control
flow in another process
14->142
144
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
14->144
148
4 other signatures
14->148
25
powershell.exe
14->25
started
27
dwm.exe
14->27
started
29
cmd.exe
14->29
started
31
10 other processes
14->31
file6
signatures7
process8
dnsIp9
84
ip-api.com
208.95.112.1, 49696, 80
TUT-ASUS
United States
16->84
86
discord.com
162.159.136.232, 443, 49699
CLOUDFLARENETUS
United States
16->86
70
C:\ProgramData\Microsoft\...\CTDBV.scr, PE32
16->70
dropped
72
C:\Users\user\AppData\Local\...\cheat.exe.log, ASCII
16->72
dropped
106
Antivirus detection
for dropped file
16->106
108
Multi AV Scanner detection
for dropped file
16->108
110
Detected unpacking (changes
PE section rights)
16->110
122
11 other signatures
16->122
33
cmd.exe
16->33
started
36
powershell.exe
16->36
started
44
9 other processes
16->44
74
C:\ProgramData\...\tc5e4ek38kh4.exe, PE32+
21->74
dropped
112
Query firmware table
information (likely
to detect VMs)
21->112
114
Uses powercfg.exe to
modify the power settings
21->114
116
Adds a directory exclusion
to Windows Defender
21->116
118
Modifies power options
to not sleep / hibernate
21->118
38
powershell.exe
23
21->38
started
40
cmd.exe
21->40
started
46
13 other processes
21->46
120
Loading BitLocker PowerShell
Module
25->120
42
conhost.exe
25->42
started
88
pool.hashvault.pro
216.219.85.122, 443, 49698, 49701
IS-AS-1US
United States
27->88
90
pastebin.com
172.66.171.73, 443, 49695
CLOUDFLARENETUS
United States
27->90
92
104.251.123.89, 443, 49697, 49700
1GSERVERSUS
United States
27->92
48
2 other processes
29->48
50
9 other processes
31->50
file10
signatures11
process12
signatures13
102
Uses ping.exe to check
the status of other
devices and networks
33->102
64
2 other processes
33->64
52
conhost.exe
36->52
started
104
Loading BitLocker PowerShell
Module
38->104
54
conhost.exe
38->54
started
56
conhost.exe
40->56
started
58
wusa.exe
40->58
started
60
conhost.exe
44->60
started
66
8 other processes
44->66
62
conhost.exe
46->62
started
68
13 other processes
46->68
process14
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.