Threat name:
Amadey, Mars Stealer, PureLog Stealer, Q
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs a global keyboard hook
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Reads the System eventlog
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Schedule system process
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Mars stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1472622
Sample:
mlk3kK6uLZ.exe
Startdate:
13/07/2024
Architecture:
WINDOWS
Score:
100
89
api.proxyscrape.com
2->89
91
tmpfiles.org
2->91
93
3 other IPs or domains
2->93
111
Snort IDS alert for
network traffic
2->111
113
Multi AV Scanner detection
for domain / URL
2->113
115
Found malware configuration
2->115
117
33 other signatures
2->117
10
axplong.exe
45
2->10
started
15
espartu.exe
2->15
started
17
mlk3kK6uLZ.exe
5
2->17
started
19
8 other processes
2->19
signatures3
process4
dnsIp5
95
43.153.49.49, 58985, 8888
LILLY-ASUS
Japan
10->95
97
77.232.41.110, 58979, 80
EUT-ASEUTIPNetworkRU
Russian Federation
10->97
81
C:\Users\user\AppData\Local\...\leg222.exe, PE32
10->81
dropped
83
C:\Users\user\AppData\Local\...\leg222[1].exe, PE32
10->83
dropped
167
Antivirus detection
for dropped file
10->167
169
Multi AV Scanner detection
for dropped file
10->169
171
Detected unpacking (changes
PE section rights)
10->171
187
3 other signatures
10->187
21
leg222.exe
10->21
started
24
hello.exe
10->24
started
26
ZharkBOT.exe
10->26
started
38
4 other processes
10->38
173
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
15->173
175
Writes to foreign memory
regions
15->175
177
Allocates memory in
foreign processes
15->177
179
Injects a PE file into
a foreign processes
15->179
28
FRaqbC8wSA1XvpFVjCRGryWt.exe
15->28
started
30
schtasks.exe
15->30
started
32
RegSvcs.exe
15->32
started
85
C:\Users\user\AppData\Local\...\axplong.exe, PE32
17->85
dropped
87
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
17->87
dropped
181
Tries to evade debugger
and weak emulator (self
modifying code)
17->181
183
Tries to detect virtualization
through RDTSC time measurements
17->183
185
Hides threads from debuggers
17->185
34
axplong.exe
17->34
started
99
127.0.0.1
unknown
unknown
19->99
36
WerFault.exe
2
19->36
started
file6
signatures7
process8
signatures9
119
Multi AV Scanner detection
for dropped file
21->119
121
Machine Learning detection
for dropped file
21->121
123
Contains functionality
to inject code into
remote processes
21->123
40
RegAsm.exe
3
21->40
started
44
WerFault.exe
19
16
21->44
started
135
3 other signatures
24->135
46
aspnet_regiis.exe
24->46
started
49
conhost.exe
24->49
started
125
Creates an undocumented
autostart registry key
26->125
137
3 other signatures
26->137
59
2 other processes
26->59
127
Detected unpacking (changes
PE section rights)
28->127
129
Detected unpacking (overwrites
its own PE header)
28->129
139
2 other signatures
28->139
51
svchost.exe
28->51
started
53
schtasks.exe
28->53
started
55
conhost.exe
30->55
started
141
2 other signatures
34->141
131
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
38->131
133
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
38->133
143
3 other signatures
38->143
57
Hkbsse.exe
38->57
started
process10
dnsIp11
77
C:\Users\user\AppData\...\Z73fDV6g4L.exe, PE32
40->77
dropped
79
C:\Users\user\AppData\...\VP2pdCInvS.exe, PE32
40->79
dropped
145
Found many strings related
to Crypto-Wallets (likely
being stolen)
40->145
61
VP2pdCInvS.exe
40->61
started
65
Z73fDV6g4L.exe
4
40->65
started
103
85.28.47.70, 58981, 80
GES-ASRU
Russian Federation
46->103
147
Tries to steal Mail
credentials (via file
/ registry access)
46->147
149
Tries to harvest and
steal ftp login credentials
46->149
151
Tries to harvest and
steal browser information
(history, passwords,
etc)
46->151
163
2 other signatures
46->163
105
142.54.235.9
ZEROLAGUS
United States
51->105
107
199.102.104.70
ZEROLAGUS
United States
51->107
109
93 other IPs or domains
51->109
153
System process connects
to network (likely due
to code injection or
exploit)
51->153
155
Creates multiple autostart
registry keys
51->155
157
Hides threads from debuggers
51->157
165
4 other signatures
51->165
67
schtasks.exe
51->67
started
69
conhost.exe
53->69
started
159
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
59->159
161
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
59->161
71
conhost.exe
59->71
started
file12
signatures13
process14
dnsIp15
101
185.172.128.33, 49710, 8970
NADYMSS-ASRU
Russian Federation
61->101
189
Antivirus detection
for dropped file
61->189
191
Multi AV Scanner detection
for dropped file
61->191
193
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
61->193
199
4 other signatures
61->199
195
Machine Learning detection
for dropped file
65->195
197
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
65->197
73
conhost.exe
65->73
started
75
conhost.exe
67->75
started
signatures16
process17
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://77.91.77.81/soka/random.exe