Threat name:
PureCrypter, Amadey, Cerbfyne Stealer, C
Alert
Classification:
troj.adwa.spyw.evad
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Attempt to bypass Chrome Application-Bound Encryption
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected PureCrypter Trojan
Detected unpacking (changes PE section rights)
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Leaks process information
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies Windows Defender protection settings
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses cmd line tools excessively to alter registry or file data
Yara detected Amadeys stealer DLL
Yara detected Cerbfyne Stealer
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected Poverty Stealer
Yara detected Powershell download and execute
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1563394
Sample:
file.exe
Startdate:
26/11/2024
Architecture:
WINDOWS
Score:
100
93
w.tundara.dev
2->93
95
time.windows.com
2->95
97
9 other IPs or domains
2->97
137
Suricata IDS alerts
for network traffic
2->137
139
Found malware configuration
2->139
141
Antivirus / Scanner
detection for submitted
sample
2->141
143
20 other signatures
2->143
9
skotes.exe
2->9
started
14
file.exe
37
2->14
started
16
4edf09f764.exe
2->16
started
18
msedge.exe
634
2->18
started
signatures3
process4
dnsIp5
121
185.215.113.43
WHOLESALECONNECTIONSNL
Portugal
9->121
123
31.41.244.11
AEROEXPRESS-ASRU
Russian Federation
9->123
79
C:\Users\user\AppData\Local\...\filer.exe, PE32+
9->79
dropped
81
C:\Users\user\AppData\Local\...\filer[1].exe, PE32+
9->81
dropped
181
Multi AV Scanner detection
for dropped file
9->181
183
Detected unpacking (changes
PE section rights)
9->183
185
Creates multiple autostart
registry keys
9->185
199
4 other signatures
9->199
20
filer.exe
9->20
started
25
4edf09f764.exe
9->25
started
27
60114bff78.exe
9->27
started
37
3 other processes
9->37
125
185.215.113.206, 49712, 49766, 49801
WHOLESALECONNECTIONSNL
Portugal
14->125
127
185.215.113.16, 49913, 80
WHOLESALECONNECTIONSNL
Portugal
14->127
129
127.0.0.1
unknown
unknown
14->129
83
C:\Users\user\DocumentsBGIJJKKJJD.exe, PE32
14->83
dropped
85
C:\Users\user\AppData\...\softokn3[1].dll, PE32
14->85
dropped
87
C:\Users\user\AppData\Local\...\random[1].exe, PE32
14->87
dropped
89
11 other files (3 malicious)
14->89
dropped
187
Attempt to bypass Chrome
Application-Bound Encryption
14->187
189
Drops PE files to the
document folder of the
user
14->189
191
Tries to steal Mail
credentials (via file
/ registry access)
14->191
201
5 other signatures
14->201
29
cmd.exe
14->29
started
31
msedge.exe
2
11
14->31
started
33
chrome.exe
14->33
started
193
Query firmware table
information (likely
to detect VMs)
16->193
195
Found many strings related
to Crypto-Wallets (likely
being stolen)
16->195
197
Tries to harvest and
steal ftp login credentials
16->197
35
msedge.exe
18->35
started
39
3 other processes
18->39
file6
signatures7
process8
dnsIp9
99
ip-api.com
208.95.112.1
TUT-ASUS
United States
20->99
101
w.tundara.dev
51.210.106.44
OVHFR
France
20->101
77
C:\Windows\System32\drivers\etc\hosts, ASCII
20->77
dropped
145
Multi AV Scanner detection
for dropped file
20->145
147
Uses cmd line tools
excessively to alter
registry or file data
20->147
149
Tries to harvest and
steal browser information
(history, passwords,
etc)
20->149
165
3 other signatures
20->165
41
powershell.exe
20->41
started
44
powershell.exe
20->44
started
58
6 other processes
20->58
103
blade-govern.sbs
172.67.153.209
CLOUDFLARENETUS
United States
25->103
151
Query firmware table
information (likely
to detect VMs)
25->151
153
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
25->153
167
4 other signatures
25->167
109
2 other IPs or domains
27->109
155
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
27->155
169
2 other signatures
27->169
46
DocumentsBGIJJKKJJD.exe
29->46
started
49
conhost.exe
29->49
started
157
Monitors registry run
keys for changes
31->157
51
msedge.exe
31->51
started
105
192.168.2.7, 443, 49700, 49701
unknown
unknown
33->105
107
239.255.255.250
unknown
Reserved
33->107
53
chrome.exe
33->53
started
111
31 other IPs or domains
35->111
159
Detected unpacking (changes
PE section rights)
37->159
161
Binary is likely a compiled
AutoIt script file
37->161
163
Injects a PE file into
a foreign processes
37->163
56
Tq4a1Bz.exe
37->56
started
60
3 other processes
37->60
file10
signatures11
process12
dnsIp13
171
Loading BitLocker PowerShell
Module
41->171
62
conhost.exe
41->62
started
64
conhost.exe
44->64
started
91
C:\Users\user\AppData\Local\...\skotes.exe, PE32
46->91
dropped
173
Multi AV Scanner detection
for dropped file
46->173
175
Detected unpacking (changes
PE section rights)
46->175
177
Tries to evade debugger
and weak emulator (self
modifying code)
46->177
179
4 other signatures
46->179
66
skotes.exe
46->66
started
113
plus.l.google.com
172.217.17.78, 443, 49770
GOOGLEUS
United States
53->113
115
www.google.com
172.217.21.36, 443, 49733, 49734
GOOGLEUS
United States
53->115
117
apis.google.com
53->117
119
185.244.212.106
M247GB
Romania
56->119
69
conhost.exe
58->69
started
71
conhost.exe
58->71
started
73
conhost.exe
58->73
started
75
3 other processes
58->75
file14
signatures15
process16
signatures17
131
Hides threads from debuggers
66->131
133
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
66->133
135
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
66->135
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.