Threat name:
Python Stealer, Amadey, Monster Stealer,
Alert
Classification:
troj.spyw.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected generic credential text file
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Gathers network related connection and port information
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Generic Python Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1460136
Sample:
setup.exe
Startdate:
20/06/2024
Architecture:
WINDOWS
Score:
100
158
Found malware configuration
2->158
160
Malicious sample detected
(through community Yara
rule)
2->160
162
Antivirus detection
for URL or domain
2->162
164
20 other signatures
2->164
11
setup.exe
5
2->11
started
15
axplong.exe
2->15
started
17
svchost.exe
2->17
started
20
Hkbsse.exe
2->20
started
process3
dnsIp4
114
C:\Users\user\AppData\Local\...\axplong.exe, PE32
11->114
dropped
116
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
11->116
dropped
218
Detected unpacking (changes
PE section rights)
11->218
220
Tries to evade debugger
and weak emulator (self
modifying code)
11->220
222
Tries to detect virtualization
through RDTSC time measurements
11->222
224
Potentially malicious
time measurement code
found
11->224
22
axplong.exe
46
11->22
started
226
Hides threads from debuggers
15->226
228
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
15->228
230
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
15->230
136
184.28.90.27
AKAMAI-ASUS
United States
17->136
file5
signatures6
process7
dnsIp8
140
77.91.77.81
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
22->140
142
185.172.128.116
NADYMSS-ASRU
Russian Federation
22->142
92
C:\Users\user\...\quickaccesspopup.exe, PE32+
22->92
dropped
94
C:\Users\user\AppData\Local\Temp\...\legs.exe, PE32
22->94
dropped
96
C:\Users\user\AppData\Local\...\monster.exe, PE32+
22->96
dropped
98
19 other malicious files
22->98
dropped
188
Antivirus detection
for dropped file
22->188
190
Multi AV Scanner detection
for dropped file
22->190
192
Detected unpacking (changes
PE section rights)
22->192
194
7 other signatures
22->194
27
judit.exe
47
22->27
started
31
monster.exe
22->31
started
33
upd.exe
22->33
started
35
7 other processes
22->35
file9
signatures10
process11
dnsIp12
118
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
27->118
dropped
120
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
27->120
dropped
122
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
27->122
dropped
130
32 other files (31 malicious)
27->130
dropped
232
Multi AV Scanner detection
for dropped file
27->232
234
Machine Learning detection
for dropped file
27->234
236
Found many strings related
to Crypto-Wallets (likely
being stolen)
27->236
238
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
27->238
38
stub.exe
29
27->38
started
124
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
31->124
dropped
126
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
31->126
dropped
128
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
31->128
dropped
132
32 other files (31 malicious)
31->132
dropped
240
Writes to foreign memory
regions
33->240
242
Allocates memory in
foreign processes
33->242
244
Injects a PE file into
a foreign processes
33->244
43
RegAsm.exe
33->43
started
45
RegAsm.exe
33->45
started
138
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
35->138
134
2 other malicious files
35->134
dropped
246
Antivirus detection
for dropped file
35->246
248
Queries sensitive service
information (via WMI,
Win32_LogicalDisk, often
done to detect sandboxes)
35->248
47
da_protected.exe
35->47
started
49
MSBuild.exe
35->49
started
51
RegAsm.exe
35->51
started
53
2 other processes
35->53
file13
signatures14
process15
dnsIp16
144
208.95.112.1
TUT-ASUS
United States
38->144
146
185.199.109.133
FASTLYUS
Netherlands
38->146
154
2 other IPs or domains
38->154
100
C:\Users\user\AppData\Local\...\Monster.exe, PE32+
38->100
dropped
102
C:\Users\user\AppData\...\system_info.txt, Algol
38->102
dropped
104
C:\Users\user\AppData\...\process_info.txt, ASCII
38->104
dropped
112
3 other malicious files
38->112
dropped
196
Multi AV Scanner detection
for dropped file
38->196
198
Tries to harvest and
steal browser information
(history, passwords,
etc)
38->198
200
Modifies the windows
firewall
38->200
214
5 other signatures
38->214
55
cmd.exe
38->55
started
58
cmd.exe
38->58
started
60
cmd.exe
38->60
started
69
9 other processes
38->69
106
C:\Users\user\AppData\Roaming\...\svhoost.exe, PE32
43->106
dropped
108
C:\Users\user\AppData\Roaming\...\One.exe, PE32
43->108
dropped
62
svhoost.exe
43->62
started
65
One.exe
43->65
started
202
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
45->202
148
195.2.71.70
VDSINA-ASRU
Russian Federation
47->148
110
C:\Users\user\AppData\Local\Temp\oryefy.exe, PE32+
47->110
dropped
204
Detected unpacking (changes
PE section rights)
47->204
206
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
47->206
208
Query firmware table
information (likely
to detect VMs)
47->208
216
4 other signatures
47->216
150
104.21.91.177
CLOUDFLARENETUS
United States
49->150
210
Tries to harvest and
steal ftp login credentials
49->210
212
Tries to steal Crypto
Currency Wallets
49->212
152
4.185.27.237
LEVEL3US
United States
51->152
67
conhost.exe
53->67
started
file17
signatures18
process19
dnsIp20
166
Uses netsh to modify
the Windows network
and firewall settings
55->166
168
Tries to harvest and
steal WLAN passwords
55->168
170
Uses attrib.exe to hide
files
55->170
71
conhost.exe
55->71
started
74
systeminfo.exe
58->74
started
76
net.exe
58->76
started
86
3 other processes
58->86
78
WMIC.exe
60->78
started
80
conhost.exe
60->80
started
156
185.172.128.33
NADYMSS-ASRU
Russian Federation
62->156
172
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
62->172
174
Installs new ROOT certificates
62->174
176
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
62->176
178
Tries to steal Crypto
Currency Wallets
62->178
82
conhost.exe
65->82
started
84
powershell.exe
69->84
started
88
16 other processes
69->88
signatures21
process22
signatures23
180
Queries sensitive service
information (via WMI,
Win32_StartupCommand,
often done to detect
sandboxes)
71->180
182
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
74->182
90
net1.exe
76->90
started
184
Queries sensitive service
information (via WMI,
Win32_LogicalDisk, often
done to detect sandboxes)
78->184
186
Installs new ROOT certificates
84->186
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.