Threat name:
Amadey, Credential Flusher, DarkVision R
Alert
Classification:
troj.spyw.expl.evad
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Drops script or batch files to the startup folder
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Drops script at startup location
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected DarkVision Rat
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected UAC Bypass using CMSTP
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1571262
Sample:
file.exe
Startdate:
09/12/2024
Architecture:
WINDOWS
Score:
100
127
woo097878781.win
2->127
129
youtube.com
2->129
131
14 other IPs or domains
2->131
155
Multi AV Scanner detection
for domain / URL
2->155
157
Suricata IDS alerts
for network traffic
2->157
159
Found malware configuration
2->159
161
27 other signatures
2->161
11
skotes.exe
4
28
2->11
started
16
file.exe
5
2->16
started
18
skotes.exe
2->18
started
20
6 other processes
2->20
signatures3
process4
dnsIp5
143
185.215.113.43, 49754, 49764, 49777
WHOLESALECONNECTIONSNL
Portugal
11->143
145
185.215.113.16, 49783, 49807, 49829
WHOLESALECONNECTIONSNL
Portugal
11->145
147
31.41.244.11, 49766, 80
AEROEXPRESS-ASRU
Russian Federation
11->147
111
C:\Users\user\AppData\...\6dce78ba2b.exe, PE32
11->111
dropped
113
C:\Users\user\AppData\...\b5c7128cd0.exe, PE32
11->113
dropped
115
C:\Users\user\AppData\...\2bd330404c.exe, PE32
11->115
dropped
121
7 other malicious files
11->121
dropped
217
Creates multiple autostart
registry keys
11->217
219
Hides threads from debuggers
11->219
221
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->221
22
4ZAAIhb.exe
8
11->22
started
26
2bd330404c.exe
11->26
started
29
c92938c010.exe
11->29
started
37
2 other processes
11->37
117
C:\Users\user\AppData\Local\...\skotes.exe, PE32
16->117
dropped
119
C:\Users\user\...\skotes.exe:Zone.Identifier, ASCII
16->119
dropped
223
Detected unpacking (changes
PE section rights)
16->223
225
Tries to evade debugger
and weak emulator (self
modifying code)
16->225
227
Tries to detect virtualization
through RDTSC time measurements
16->227
31
skotes.exe
16->31
started
229
Antivirus detection
for dropped file
18->229
231
Multi AV Scanner detection
for dropped file
18->231
233
Machine Learning detection
for dropped file
18->233
235
Found evasive API chain
(may stop execution
after reading information
in the PEB, e.g. number
of processors)
18->235
237
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
20->237
33
firefox.exe
20->33
started
35
taskkill.exe
20->35
started
file6
signatures7
process8
dnsIp9
99
C:\Users\user\AppData\Local\Temp\...\D6E.bat, ASCII
22->99
dropped
163
Multi AV Scanner detection
for dropped file
22->163
165
Machine Learning detection
for dropped file
22->165
39
cmd.exe
2
22->39
started
133
185.215.113.206, 49827, 49880, 80
WHOLESALECONNECTIONSNL
Portugal
26->133
101
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
26->101
dropped
103
C:\Users\user\AppData\...\mozglue[1].dll, PE32
26->103
dropped
105
C:\Users\user\AppData\...\freebl3[1].dll, PE32
26->105
dropped
107
5 other files (3 malicious)
26->107
dropped
167
Antivirus detection
for dropped file
26->167
169
Detected unpacking (changes
PE section rights)
26->169
171
Attempt to bypass Chrome
Application-Bound Encryption
26->171
181
2 other signatures
26->181
43
chrome.exe
26->43
started
135
atten-supporse.biz
104.21.16.9, 443, 49799, 49806
CLOUDFLARENETUS
United States
29->135
173
Query firmware table
information (likely
to detect VMs)
29->173
175
Found many strings related
to Crypto-Wallets (likely
being stolen)
29->175
183
2 other signatures
29->183
185
3 other signatures
31->185
137
youtube.com
142.250.181.78, 443, 49895, 49896
GOOGLEUS
United States
33->137
139
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82, 49897, 49909, 49910
GOOGLEUS
United States
33->139
141
5 other IPs or domains
33->141
45
firefox.exe
33->45
started
47
firefox.exe
33->47
started
49
conhost.exe
35->49
started
177
Binary is likely a compiled
AutoIt script file
37->177
179
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
37->179
187
3 other signatures
37->187
51
taskkill.exe
37->51
started
53
taskkill.exe
37->53
started
55
taskkill.exe
37->55
started
57
3 other processes
37->57
file10
signatures11
process12
file13
109
C:\Users\user\...\AutoRun_WindosCPUsystem.bat, DOS
39->109
dropped
189
Suspicious powershell
command line found
39->189
191
Drops script or batch
files to the startup
folder
39->191
193
Adds a directory exclusion
to Windows Defender
39->193
59
downloaded_file.exe
39->59
started
62
powershell.exe
23
39->62
started
64
powershell.exe
14
16
39->64
started
78
4 other processes
39->78
68
conhost.exe
51->68
started
70
conhost.exe
53->70
started
72
conhost.exe
55->72
started
74
conhost.exe
57->74
started
76
conhost.exe
57->76
started
signatures14
process15
dnsIp16
201
Multi AV Scanner detection
for dropped file
59->201
203
Machine Learning detection
for dropped file
59->203
205
Adds a directory exclusion
to Windows Defender
59->205
215
2 other signatures
59->215
80
explorer.exe
59->80
started
84
cmd.exe
59->84
started
207
Found suspicious powershell
code related to unpacking
or dynamic code loading
62->207
209
Loading BitLocker PowerShell
Module
62->209
211
Powershell drops PE
file
62->211
123
woo097878781.win
154.216.20.243, 443, 49786, 49878
SKHT-ASShenzhenKatherineHengTechnologyInformationCo
Seychelles
64->123
95
C:\Users\user\AppData\...\downloaded_file.bin, data
64->95
dropped
213
Found many strings related
to Crypto-Wallets (likely
being stolen)
64->213
97
C:\Users\user\AppData\...\downloaded_file.exe, PE32
78->97
dropped
86
net1.exe
1
78->86
started
file17
signatures18
process19
dnsIp20
125
185.157.162.216, 49888, 49917, 49925
OBE-EUROPEObenetworkEuropeSE
Sweden
80->125
149
System process connects
to network (likely due
to code injection or
exploit)
80->149
151
Maps a DLL or memory
area into another process
80->151
88
explorer.exe
80->88
started
153
Adds a directory exclusion
to Windows Defender
84->153
91
powershell.exe
84->91
started
93
conhost.exe
84->93
started
signatures21
process22
signatures23
195
System process connects
to network (likely due
to code injection or
exploit)
88->195
197
Tries to harvest and
steal browser information
(history, passwords,
etc)
88->197
199
Loading BitLocker PowerShell
Module
91->199
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.