Threat name:
Binder HackTool, Blank Grabber, Dicrord
Alert
Classification:
troj.adwa.spyw.expl.evad
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to disable the Task Manager (.Net Source)
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential dropper URLs found in powershell memory
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Process Patterns NTDS.DIT Exfil
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes or reads registry keys via WMI
Yara detected Binder HackTool
Yara detected Blank Grabber
Yara detected Dicrord Rat
Yara detected Generic Downloader
Yara detected Telegram RAT
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1383391
Sample:
iostream.exe
Startdate:
30/01/2024
Architecture:
WINDOWS
Score:
100
97
discord.com
2->97
99
ip-api.com
2->99
101
gateway.discord.gg
2->101
111
Found malware configuration
2->111
113
Malicious sample detected
(through community Yara
rule)
2->113
115
Antivirus detection
for URL or domain
2->115
117
21 other signatures
2->117
12
iostream.exe
4
2->12
started
16
Shadow.exe
2->16
started
signatures3
process4
file5
91
C:\Users\user\AppData\Local\Temp\P1.EXE, PE32
12->91
dropped
93
C:\Users\user\AppData\Local\Temp\DIS.EXE, PE32+
12->93
dropped
95
C:\Users\user\AppData\Local\Temp\BUILT.EXE, PE32+
12->95
dropped
171
Found many strings related
to Crypto-Wallets (likely
being stolen)
12->171
18
BUILT.EXE
61
12->18
started
22
P1.EXE
5
12->22
started
24
DIS.EXE
14
2
12->24
started
signatures6
process7
dnsIp8
77
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
18->77
dropped
79
C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+
18->79
dropped
81
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
18->81
dropped
85
55 other malicious files
18->85
dropped
119
Multi AV Scanner detection
for dropped file
18->119
121
Very long command line
found
18->121
123
Machine Learning detection
for dropped file
18->123
133
4 other signatures
18->133
27
BUILT.EXE
1
108
18->27
started
83
C:\Windows\System32\SubDir\Shadow.exe, PE32
22->83
dropped
125
Antivirus detection
for dropped file
22->125
127
Drops executables to
the windows directory
(C:\Windows) and
starts them
22->127
129
Uses schtasks.exe or
at.exe to add and modify
task schedules
22->129
131
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
22->131
31
Shadow.exe
22->31
started
33
schtasks.exe
1
22->33
started
103
gateway.discord.gg
162.159.135.234, 443, 49700
CLOUDFLARENETUS
United States
24->103
35
WerFault.exe
19
16
24->35
started
file9
signatures10
process11
dnsIp12
105
discord.com
162.159.128.233, 443, 49723
CLOUDFLARENETUS
United States
27->105
107
ip-api.com
208.95.112.1, 49722, 80
TUT-ASUS
United States
27->107
157
Very long command line
found
27->157
159
Found many strings related
to Crypto-Wallets (likely
being stolen)
27->159
161
Tries to harvest and
steal browser information
(history, passwords,
etc)
27->161
169
6 other signatures
27->169
37
cmd.exe
27->37
started
40
cmd.exe
27->40
started
42
cmd.exe
27->42
started
48
21 other processes
27->48
109
96.42.209.236, 1111
CHARTER-20115US
United States
31->109
163
Multi AV Scanner detection
for dropped file
31->163
165
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
31->165
167
Installs a global keyboard
hook
31->167
44
schtasks.exe
31->44
started
46
conhost.exe
33->46
started
signatures13
process14
signatures15
141
Suspicious powershell
command line found
37->141
143
Very long command line
found
37->143
145
Uses cmd line tools
excessively to alter
registry or file data
37->145
155
2 other signatures
37->155
66
2 other processes
37->66
147
Encrypted powershell
cmdline option found
40->147
50
powershell.exe
40->50
started
54
conhost.exe
40->54
started
149
Modifies Windows Defender
protection settings
42->149
56
powershell.exe
42->56
started
58
conhost.exe
42->58
started
60
conhost.exe
44->60
started
151
Adds a directory exclusion
to Windows Defender
48->151
153
Tries to harvest and
steal WLAN passwords
48->153
62
getmac.exe
48->62
started
64
systeminfo.exe
48->64
started
68
40 other processes
48->68
process16
file17
87
C:\Users\user\AppData\...\5gzuqdzc.cmdline, Unicode
50->87
dropped
135
Potential dropper URLs
found in powershell
memory
50->135
70
csc.exe
50->70
started
137
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
62->137
139
Writes or reads registry
keys via WMI
62->139
73
Conhost.exe
68->73
started
signatures18
process19
file20
89
C:\Users\user\AppData\Local\...\5gzuqdzc.dll, PE32
70->89
dropped
75
cvtres.exe
70->75
started
process21
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.