Threat name:
Amadey, Glupteba, Mars Stealer, PureLog
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Searches for specific processes (likely to inject)
Sigma detected: Disable power options
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Mars stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1416900
Sample:
i1crvbOZAP.exe
Startdate:
28/03/2024
Architecture:
WINDOWS
Score:
100
108
d.392391234.xyz
2->108
110
steamcommunity.com
2->110
112
26 other IPs or domains
2->112
144
Snort IDS alert for
network traffic
2->144
146
Multi AV Scanner detection
for domain / URL
2->146
148
Found malware configuration
2->148
152
27 other signatures
2->152
9
i1crvbOZAP.exe
11
54
2->9
started
14
svchost.exe
2->14
started
16
svchost.exe
2->16
started
18
3 other processes
2->18
signatures3
150
Performs DNS queries
to domains with low
reputation
108->150
process4
dnsIp5
136
46.226.167.187, 49731, 80
SKYNET-ASSkynetLTDEkaterinburgRussiaRU
Russian Federation
9->136
138
d.392391234.xyz
95.164.45.22
NASSIST-ASGI
Gibraltar
9->138
142
24 other IPs or domains
9->142
100
C:\Users\...\xDVBd5GtHhrlSm0slOnr7_gW.exe, PE32
9->100
dropped
102
C:\Users\...\uRWnWA7bjEhugCQgmREIdGsh.exe, PE32
9->102
dropped
104
C:\Users\...\tskTMObYcvz1CtypLgyOWpYi.exe, PE32
9->104
dropped
106
27 other malicious files
9->106
dropped
198
Query firmware table
information (likely
to detect VMs)
9->198
200
Drops PE files to the
document folder of the
user
9->200
202
Creates HTML files with
.exe extension (expired
dropper behavior)
9->202
204
10 other signatures
9->204
20
D5ft_dAZwUuL52qmUM1rPffT.exe
9->20
started
25
fq9BbqPKEgDrDHrc1Aru5zuA.exe
1
9->25
started
27
Y8KGRj_sUjw5KjZpIoRDoSwV.exe
2
9->27
started
35
14 other processes
9->35
29
WerFault.exe
14->29
started
31
WerFault.exe
14->31
started
33
WerFault.exe
14->33
started
140
127.0.0.1
unknown
unknown
16->140
file6
signatures7
process8
dnsIp9
114
185.172.128.26
NADYMSS-ASRU
Russian Federation
20->114
116
185.172.128.65
NADYMSS-ASRU
Russian Federation
20->116
64
C:\Users\user\AppData\...\FHCGHJDBFI.exe, PE32
20->64
dropped
66
C:\Users\user\AppData\...\softokn3[1].dll, PE32
20->66
dropped
68
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
20->68
dropped
78
11 other files (7 malicious)
20->78
dropped
154
Detected unpacking (changes
PE section rights)
20->154
156
Detected unpacking (overwrites
its own PE header)
20->156
158
Tries to steal Mail
credentials (via file
/ registry access)
20->158
174
4 other signatures
20->174
160
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
25->160
162
Writes to foreign memory
regions
25->162
164
Allocates memory in
foreign processes
25->164
166
Injects a PE file into
a foreign processes
25->166
37
RegAsm.exe
25->37
started
42
conhost.exe
25->42
started
44
WerFault.exe
25->44
started
70
C:\Users\...\Y8KGRj_sUjw5KjZpIoRDoSwV.tmp, PE32
27->70
dropped
46
Y8KGRj_sUjw5KjZpIoRDoSwV.tmp
27->46
started
118
5.42.65.117
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
35->118
120
193.233.132.67
FREE-NET-ASFREEnetEU
Russian Federation
35->120
122
db-ip.com
104.26.4.15
CLOUDFLARENETUS
United States
35->122
72
C:\Users\user\AppData\...\Protect544cd51a.dll, PE32
35->72
dropped
74
C:\Users\user\AppData\Local\...\Install.exe, PE32
35->74
dropped
76
C:\Users\user\AppData\Local\...\explorha.exe, PE32
35->76
dropped
80
2 other malicious files
35->80
dropped
168
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
35->168
170
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
35->170
172
Found many strings related
to Crypto-Wallets (likely
being stolen)
35->172
176
16 other signatures
35->176
48
RegAsm.exe
35->48
started
50
RegAsm.exe
35->50
started
52
explorer.exe
35->52
injected
54
8 other processes
35->54
file10
signatures11
process12
dnsIp13
124
steamcommunity.com
23.47.27.74
AKAMAI-ASUS
United States
37->124
126
78.46.229.36
HETZNER-ASDE
Germany
37->126
128
centrosmissextensions.com
162.19.138.79
CENTURYLINK-US-LEGACY-QWESTUS
United States
37->128
82
C:\Users\user\AppData\...\mozglue[1].dll, PE32
37->82
dropped
94
10 other files (8 malicious)
37->94
dropped
178
Tries to harvest and
steal Putty / WinSCP
information (sessions,
passwords, etc)
37->178
180
Tries to steal Crypto
Currency Wallets
37->180
182
Tries to harvest and
steal Bitcoin Wallet
information
37->182
84
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
46->84
dropped
86
C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32
46->86
dropped
88
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
46->88
dropped
96
16 other files (15 malicious)
46->96
dropped
130
5.42.65.0
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
48->130
184
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
48->184
186
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
48->186
188
Tries to harvest and
steal browser information
(history, passwords,
etc)
48->188
132
104.104.85.160
AKAMAI-ASUS
United States
50->132
98
3 other files (2 malicious)
50->98
dropped
190
Tries to harvest and
steal ftp login credentials
50->190
134
nidoe.org
37.255.238.137
TCIIR
Iran (ISLAMIC Republic Of)
52->134
90
C:\Users\user\AppData\Roaming\wsjtivv, PE32
52->90
dropped
192
System process connects
to network (likely due
to code injection or
exploit)
52->192
194
Benign windows process
drops PE files
52->194
196
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
52->196
92
C:\Users\user\AppData\Local\...\Install.exe, PE32
54->92
dropped
56
conhost.exe
54->56
started
58
conhost.exe
54->58
started
60
conhost.exe
54->60
started
62
2 other processes
54->62
file14
signatures15
process16
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://193.233.132.175/server/ww12/AppGate2103v01.exe