Threat name:
HackBrowser, DCRat, Discord Token Steale
Alert
Classification:
spre.troj.spyw.expl.evad.mine
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Creates processes via WMI
Detected unpacking (creates a PE file in dynamic memory)
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Infects executable files (exe, dll, sys, html)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries Google from non browser process on port 80
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sample uses string decryption to hide its real strings
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Stop multiple services
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Sigma detected: WScript or CScript Dropper
Stops critical windows services
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Amnesia Stealer
Yara detected Costura Assembly Loader
Yara detected Discord Token Stealer
Yara detected Millenuim RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1620959
Sample:
3Lw8TDhz3z.exe
Startdate:
21/02/2025
Architecture:
WINDOWS
Score:
100
151
api.telegram.org
2->151
153
www.google.com
2->153
155
3 other IPs or domains
2->155
181
Suricata IDS alerts
for network traffic
2->181
183
Found malware configuration
2->183
185
Malicious sample detected
(through community Yara
rule)
2->185
189
35 other signatures
2->189
15
3Lw8TDhz3z.exe
13
2->15
started
19
kVro2ol299K.exe
2->19
started
21
powershell.exe
2->21
started
23
2 other processes
2->23
signatures3
187
Uses the Telegram API
(likely for C&C
communication)
151->187
process4
file5
143
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
15->143
dropped
145
C:\Users\user\AppData\Local\...\select.pyd, PE32+
15->145
dropped
147
C:\Users\user\AppData\Local\...\python312.dll, PE32+
15->147
dropped
149
8 other malicious files
15->149
dropped
165
Found pyInstaller with
non standard icon
15->165
25
3Lw8TDhz3z.exe
15->25
started
167
Antivirus detection
for dropped file
19->167
169
Multi AV Scanner detection
for dropped file
19->169
171
Found direct / indirect
Syscall (likely to bypass
EDR)
19->171
173
Loading BitLocker PowerShell
Module
21->173
27
conhost.exe
21->27
started
29
conhost.exe
23->29
started
31
sc.exe
23->31
started
33
sc.exe
23->33
started
35
3 other processes
23->35
signatures6
process7
process8
37
cmd.exe
1
25->37
started
40
Conhost.exe
25->40
started
signatures9
221
Wscript starts Powershell
(via cmd or directly)
37->221
223
Modifies Windows Defender
protection settings
37->223
225
Adds a directory exclusion
to Windows Defender
37->225
227
Stops critical windows
services
37->227
42
Build.exe
6
37->42
started
46
conhost.exe
37->46
started
48
Conhost.exe
37->48
started
process10
file11
139
C:\ProgramData\Microsoft\hacn.exe, PE32+
42->139
dropped
141
C:\ProgramData\Microsoft\based.exe, PE32+
42->141
dropped
233
Multi AV Scanner detection
for dropped file
42->233
50
hacn.exe
13
42->50
started
54
based.exe
22
42->54
started
235
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
46->235
signatures12
process13
file14
97
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
50->97
dropped
99
C:\Users\user\AppData\Local\...\select.pyd, PE32+
50->99
dropped
101
C:\Users\user\AppData\Local\Temp\...\s.exe, PE32
50->101
dropped
109
8 other malicious files
50->109
dropped
191
Antivirus detection
for dropped file
50->191
193
Multi AV Scanner detection
for dropped file
50->193
56
hacn.exe
50->56
started
103
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
54->103
dropped
105
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
54->105
dropped
107
C:\Users\user\AppData\Local\...\select.pyd, PE32+
54->107
dropped
111
15 other malicious files
54->111
dropped
195
Modifies Windows Defender
protection settings
54->195
197
Adds a directory exclusion
to Windows Defender
54->197
199
Removes signatures from
Windows Defender
54->199
58
based.exe
2
54->58
started
signatures15
process16
dnsIp17
62
cmd.exe
1
56->62
started
157
api.telegram.org
149.154.167.220, 443, 49948, 49979
TELEGRAMRU
United Kingdom
58->157
159
discord.com
162.159.136.232, 443, 49942
CLOUDFLARENETUS
United States
58->159
237
Found many strings related
to Crypto-Wallets (likely
being stolen)
58->237
239
Tries to harvest and
steal browser information
(history, passwords,
etc)
58->239
241
Modifies Windows Defender
protection settings
58->241
243
2 other signatures
58->243
64
cmd.exe
58->64
started
67
cmd.exe
58->67
started
signatures18
process19
signatures20
69
s.exe
7
62->69
started
73
conhost.exe
62->73
started
175
Wscript starts Powershell
(via cmd or directly)
64->175
177
Adds a directory exclusion
to Windows Defender
64->177
75
powershell.exe
64->75
started
77
conhost.exe
64->77
started
179
Modifies Windows Defender
protection settings
67->179
79
powershell.exe
67->79
started
81
conhost.exe
67->81
started
process21
file22
131
C:\ProgramData\svchost.exe, PE32
69->131
dropped
133
C:\ProgramData\setup.exe, PE32+
69->133
dropped
135
C:\ProgramData\main.exe, PE32
69->135
dropped
137
C:\ProgramData\crss.exe, PE32+
69->137
dropped
229
Drops PE files with
benign system names
69->229
83
svchost.exe
69->83
started
87
crss.exe
69->87
started
89
setup.exe
69->89
started
91
main.exe
69->91
started
231
Loading BitLocker PowerShell
Module
75->231
signatures23
process24
dnsIp25
113
C:\Users\user\...\ChainComServermonitor.exe, PE32
83->113
dropped
127
2 other malicious files
83->127
dropped
201
Antivirus detection
for dropped file
83->201
203
Multi AV Scanner detection
for dropped file
83->203
94
wscript.exe
83->94
started
115
C:\Users\...\_wrappers.cp310-win_amd64.pyd, PE32+
87->115
dropped
117
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
87->117
dropped
129
27 other malicious files
87->129
dropped
205
Detected unpacking (creates
a PE file in dynamic
memory)
87->205
207
Queries Google from
non browser process
on port 80
87->207
119
C:\Users\user\AppData\...\wxyubnjmnlae.tmp, PE32+
89->119
dropped
121
C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+
89->121
dropped
209
Writes to foreign memory
regions
89->209
211
Modifies the context
of a thread in another
process (thread injection)
89->211
213
Found hidden mapped
module (file has been
removed from disk)
89->213
219
3 other signatures
89->219
161
ip-api.com
208.95.112.1, 49794, 49923, 49940
TUT-ASUS
United States
91->161
163
raw.githubusercontent.com
185.199.109.133, 443, 49812, 49898
FASTLYUS
Netherlands
91->163
123
C:\Users\user\AppData\Roaming\...\Update.exe, PE32
91->123
dropped
125
C:\Users\user\AppData\...\sqlite.interop.dll, PE32+
91->125
dropped
215
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
91->215
217
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
91->217
file26
signatures27
process28
signatures29
245
Wscript starts Powershell
(via cmd or directly)
94->245
247
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
94->247
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.