Threat name:
Amadey, Cryptbot, PureLog Stealer, RedLi
Alert
Classification:
troj.spyw.expl.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
High number of junk calls founds (likely related to sandbox DOS / API hammering)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Sigma detected: Forfiles.EXE Child Process Masquerading
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys stealer DLL
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1492636
Sample:
file.exe
Startdate:
14/08/2024
Architecture:
WINDOWS
Score:
100
138
jSbXVBiItIINfreBHvLPHxDRe.jSbXVBiItIINfreBHvLPHxDRe
2->138
140
fivexc5vt.top
2->140
142
2 other IPs or domains
2->142
158
Multi AV Scanner detection
for domain / URL
2->158
160
Suricata IDS alerts
for network traffic
2->160
162
Found malware configuration
2->162
164
31 other signatures
2->164
11
axplong.exe
45
2->11
started
16
file.exe
5
2->16
started
18
axplong.exe
2->18
started
20
2 other processes
2->20
signatures3
process4
dnsIp5
154
185.215.113.16, 49712, 49713, 49715
WHOLESALECONNECTIONSNL
Portugal
11->154
156
185.196.11.123, 49716, 80
SIMPLECARRIERCH
Switzerland
11->156
120
C:\Users\user\AppData\Local\...\runtime.exe, PE32
11->120
dropped
122
C:\Users\user\AppData\...\PctOccurred.exe, PE32
11->122
dropped
124
C:\Users\user\AppData\Local\Temp\...\DOC.exe, PE32
11->124
dropped
130
18 other malicious files
11->130
dropped
224
Hides threads from debuggers
11->224
226
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->226
228
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->228
22
rorukal.exe
11->22
started
26
stealc_default.exe
11->26
started
29
crypteda.exe
1
11->29
started
35
6 other processes
11->35
126
C:\Users\user\AppData\Local\...\axplong.exe, PE32
16->126
dropped
128
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
16->128
dropped
230
Detected unpacking (changes
PE section rights)
16->230
232
Tries to evade debugger
and weak emulator (self
modifying code)
16->232
234
Tries to detect virtualization
through RDTSC time measurements
16->234
31
axplong.exe
16->31
started
236
Multi AV Scanner detection
for dropped file
18->236
238
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
18->238
240
Potentially malicious
time measurement code
found
18->240
242
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
20->242
33
MindLynx.pif
20->33
started
file6
signatures7
process8
dnsIp9
100
C:\ProgramData\Microsoft\Windows\...\cmd.exe, PE32
22->100
dropped
102
C:\ProgramData\Microsoft\...\forfiles.exe, PE32+
22->102
dropped
178
Multi AV Scanner detection
for dropped file
22->178
180
Detected unpacking (changes
PE section rights)
22->180
182
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
22->182
37
forfiles.exe
22->37
started
146
185.215.113.17, 49724, 80
WHOLESALECONNECTIONSNL
Portugal
26->146
104
C:\Users\user\AppData\...\softokn3[1].dll, PE32
26->104
dropped
106
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
26->106
dropped
108
C:\Users\user\AppData\...\mozglue[1].dll, PE32
26->108
dropped
112
9 other files (5 malicious)
26->112
dropped
184
Tries to steal Mail
credentials (via file
/ registry access)
26->184
186
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->186
188
Tries to harvest and
steal ftp login credentials
26->188
196
3 other signatures
26->196
198
3 other signatures
29->198
39
RegAsm.exe
29->39
started
43
conhost.exe
29->43
started
200
3 other signatures
31->200
148
185.215.113.67, 21405, 49722, 49730
WHOLESALECONNECTIONSNL
Portugal
35->148
150
45.66.231.214, 49732, 9932
CMCSUS
Germany
35->150
152
fivexc5vt.top
172.67.161.137
CLOUDFLARENETUS
United States
35->152
110
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
35->110
dropped
190
Antivirus detection
for dropped file
35->190
192
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
35->192
194
Machine Learning detection
for dropped file
35->194
202
2 other signatures
35->202
45
cmd.exe
35->45
started
47
Hkbsse.exe
35->47
started
49
RegAsm.exe
2
35->49
started
52
2 other processes
35->52
file10
signatures11
process12
dnsIp13
54
cmd.exe
37->54
started
57
conhost.exe
37->57
started
114
C:\Users\user\AppData\...\LbjIdugiIw.exe, PE32
39->114
dropped
116
C:\Users\user\AppData\...\7YLGfG4DzX.exe, PE32
39->116
dropped
210
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->210
59
7YLGfG4DzX.exe
39->59
started
61
LbjIdugiIw.exe
39->61
started
118
C:\Users\user\AppData\Local\...\Beijing.pif, PE32
45->118
dropped
212
Drops PE files with
a suspicious file extension
45->212
214
Uses schtasks.exe or
at.exe to add and modify
task schedules
45->214
63
Beijing.pif
45->63
started
66
conhost.exe
45->66
started
68
tasklist.exe
45->68
started
72
7 other processes
45->72
216
Multi AV Scanner detection
for dropped file
47->216
218
Machine Learning detection
for dropped file
47->218
70
Conhost.exe
47->70
started
136
20.52.165.210, 39030, 49714, 49718
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
49->136
file14
signatures15
process16
file17
166
Multi AV Scanner detection
for dropped file
54->166
168
Machine Learning detection
for dropped file
54->168
170
Writes to foreign memory
regions
54->170
176
2 other signatures
54->176
74
AppLaunch.exe
54->74
started
172
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
59->172
77
conhost.exe
59->77
started
79
conhost.exe
61->79
started
132
C:\Users\user\AppData\Local\...\MindLynx.pif, PE32
63->132
dropped
134
C:\Users\user\AppData\Local\...\MindLynx.js, ASCII
63->134
dropped
174
Drops PE files with
a suspicious file extension
63->174
81
cmd.exe
63->81
started
84
cmd.exe
63->84
started
signatures18
process19
file20
220
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
74->220
222
Injects a PE file into
a foreign processes
74->222
86
AppLaunch.exe
74->86
started
90
conhost.exe
74->90
started
98
C:\Users\user\AppData\...\MindLynx.url, MS
81->98
dropped
92
conhost.exe
81->92
started
94
conhost.exe
84->94
started
96
schtasks.exe
84->96
started
signatures21
process22
dnsIp23
144
127.0.0.1
unknown
unknown
86->144
204
Creates an undocumented
autostart registry key
86->204
206
Creates multiple autostart
registry keys
86->206
208
Creates an autostart
registry key pointing
to binary in C:\Windows
86->208
signatures24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.