Threat name:
AveMaria, Phantom stealer, Strela Steale
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates processes via WMI
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Powershell is started from unusual location (likely to bypass HIPS)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Renames powershell.exe to bypass HIPS
Sample has a suspicious name (potential lure to open the executable)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected AveMaria stealer
Yara detected Costura Assembly Loader
Yara detected Phantom stealer
Yara detected Powershell decode and execute
Yara detected Strela Stealer
Yara detected Telegram RAT
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1814942
Sample:
Legal Notice for Outstandin...
Startdate:
16/11/2025
Architecture:
WINDOWS
Score:
100
76
api.telegram.org
2->76
78
prod.classify-client.prod.webservices.mozgcp.net
2->78
80
2 other IPs or domains
2->80
96
Suricata IDS alerts
for network traffic
2->96
98
Found malware configuration
2->98
100
Malicious sample detected
(through community Yara
rule)
2->100
104
26 other signatures
2->104
13
wscript.exe
1
1
2->13
started
16
powershell.exe
2->16
started
18
powershell.exe
2->18
started
20
svchost.exe
1
1
2->20
started
signatures3
102
Uses the Telegram API
(likely for C&C
communication)
76->102
process4
dnsIp5
124
Wscript starts Powershell
(via cmd or directly)
13->124
126
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
13->126
128
Suspicious execution
chain found
13->128
130
Creates processes via
WMI
13->130
23
cmd.exe
1
13->23
started
132
Powershell is started
from unusual location
(likely to bypass HIPS)
16->132
134
Reads the Security eventlog
16->134
136
Reads the System eventlog
16->136
26
conhost.exe
16->26
started
28
conhost.exe
18->28
started
82
127.0.0.1
unknown
unknown
20->82
signatures6
process7
signatures8
106
Suspicious powershell
command line found
23->106
108
Wscript starts Powershell
(via cmd or directly)
23->108
110
Bypasses PowerShell
execution policy
23->110
30
cmd.exe
1
23->30
started
32
conhost.exe
23->32
started
process9
process10
34
cmd.exe
2
30->34
started
signatures11
92
Suspicious powershell
command line found
34->92
94
Wscript starts Powershell
(via cmd or directly)
34->94
37
powershell.exe
27
45
34->37
started
42
conhost.exe
34->42
started
process12
dnsIp13
84
103.83.86.27, 1212, 49685, 49691
GELEXIY-AS-INGelexiyCabNetIN
India
37->84
86
api.telegram.org
149.154.167.220, 443, 49684
TELEGRAMRU
United Kingdom
37->86
88
icanhazip.com
104.16.184.241
CLOUDFLARENETUS
United States
37->88
70
C:\Users\user\AppData\...\powershell.exe, PE32+
37->70
dropped
72
C:\Users\user\AppData\...\XWormClient.exe, PE32+
37->72
dropped
74
C:\Users\user\AppData\...\XWormClient.lnk, MS
37->74
dropped
112
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
37->112
114
Found many strings related
to Crypto-Wallets (likely
being stolen)
37->114
116
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
37->116
118
9 other signatures
37->118
44
firefox.exe
1
37->44
started
46
msedge.exe
37->46
started
49
csc.exe
4
37->49
started
52
3 other processes
37->52
file14
signatures15
process16
file17
54
firefox.exe
3
51
44->54
started
138
Writes to foreign memory
regions
46->138
58
msedge.exe
46->58
started
68
C:\Users\user\AppData\...\powershell.exe, PE32
49->68
dropped
60
conhost.exe
49->60
started
62
cvtres.exe
1
49->62
started
signatures18
process19
dnsIp20
90
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
GOOGLEUS
United States
54->90
120
Monitors registry run
keys for changes
54->120
122
Installs a global keyboard
hook
54->122
64
firefox.exe
54->64
started
66
firefox.exe
54->66
started
signatures21
process22
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.