Threat name:
Fabookie, Glupteba, PrivateLoader, RedLi
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates files in the system32 config directory
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
DNS related to crypt mining pools
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies Group Policy settings
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Performs DNS TXT record lookups
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Schedule system process
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses STUN server to do NAT traversial
Writes to foreign memory regions
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1314772
Sample:
file.exe
Startdate:
26/09/2023
Architecture:
WINDOWS
Score:
100
156
z.nnnaajjjgc.com
2->156
158
xmr-eu1.nanopool.org
2->158
160
2 other IPs or domains
2->160
198
Snort IDS alert for
network traffic
2->198
200
Found malware configuration
2->200
202
Malicious sample detected
(through community Yara
rule)
2->202
204
34 other signatures
2->204
12
file.exe
11
41
2->12
started
17
cuiddgj
2->17
started
19
svchost.exe
2->19
started
21
6 other processes
2->21
signatures3
process4
dnsIp5
180
94.142.138.113, 49786, 49832, 80
IHOR-ASRU
Russian Federation
12->180
182
171.22.28.222, 49795, 80
CMCSUS
Germany
12->182
184
16 other IPs or domains
12->184
148
C:\Users\...\vzGhFQt1i790lk4BnLnMP7kl.exe, PE32
12->148
dropped
150
C:\Users\...\p3cBOHQdNIbtQHAhKvpXdkZU.exe, PE32
12->150
dropped
152
C:\Users\...\dLVYBrpPYU1VYXsjndexnaPQ.exe, PE32+
12->152
dropped
154
13 other malicious files
12->154
dropped
256
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
12->256
258
May check the online
IP address of the machine
12->258
260
Creates HTML files with
.exe extension (expired
dropper behavior)
12->260
268
5 other signatures
12->268
23
_aNGExde_YsqKtC8EcOlNmbu.exe
13
12->23
started
26
3ekhqs9pVLWfM2w0MNdPlbp_.exe
12->26
started
30
vzGhFQt1i790lk4BnLnMP7kl.exe
1
12->30
started
34
6 other processes
12->34
262
Multi AV Scanner detection
for dropped file
17->262
264
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
17->264
266
Maps a DLL or memory
area into another process
17->266
270
2 other signatures
17->270
32
WerFault.exe
19->32
started
file6
signatures7
process8
dnsIp9
224
Found Tor onion address
23->224
226
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
23->226
36
_aNGExde_YsqKtC8EcOlNmbu.exe
23->36
started
40
powershell.exe
23->40
started
168
45.15.156.229, 49833, 80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
26->168
170
45.9.74.80, 49845, 49846, 80
FIRST-SERVER-EU-ASRU
Russian Federation
26->170
176
4 other IPs or domains
26->176
134
C:\Users\...\u39Q8X9bUuNIob26IwpW8Cfr.exe, PE32
26->134
dropped
136
C:\Users\...\703ytzkzIyzjKg_XQtw91XEO.exe, PE32
26->136
dropped
138
C:\Users\user\AppData\Local\...\harbar[1].exe, PE32
26->138
dropped
140
C:\Users\user\AppData\...\fikim0926727[1].exe, PE32
26->140
dropped
228
Disables Windows Defender
(deletes autostart)
26->228
230
Disable Windows Defender
real time protection
(registry)
26->230
42
703ytzkzIyzjKg_XQtw91XEO.exe
26->42
started
44
u39Q8X9bUuNIob26IwpW8Cfr.exe
26->44
started
232
Writes to foreign memory
regions
30->232
234
Allocates memory in
foreign processes
30->234
236
Injects a PE file into
a foreign processes
30->236
46
vbc.exe
30->46
started
49
conhost.exe
30->49
started
172
app.nnnaajjjgc.com
34->172
174
185.225.73.32, 44973, 49836
MAYAKBG
Germany
34->174
178
3 other IPs or domains
34->178
142
C:\Users\user\AppData\Local\...\Je5uyAd.w, PE32
34->142
dropped
144
C:\ProgramData\x64netJS\JQSZY.exe, PE32+
34->144
dropped
146
C:\Users\...\49ff47939f049ef33ab95c6a521590b5, SQLite
34->146
dropped
238
Found many strings related
to Crypto-Wallets (likely
being stolen)
34->238
240
Tries to harvest and
steal browser information
(history, passwords,
etc)
34->240
242
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
34->242
246
4 other signatures
34->246
51
explorer.exe
34->51
injected
53
cmd.exe
34->53
started
55
2 other processes
34->55
file10
244
Performs DNS TXT record
lookups
172->244
signatures11
process12
dnsIp13
108
C:\Windows\rss\csrss.exe, PE32
36->108
dropped
206
Drops executables to
the windows directory
(C:\Windows) and
starts them
36->206
208
Creates an autostart
registry key pointing
to binary in C:\Windows
36->208
57
csrss.exe
36->57
started
62
cmd.exe
36->62
started
64
powershell.exe
36->64
started
74
2 other processes
36->74
66
conhost.exe
40->66
started
110
C:\Users\user\AppData\Local\...\toolspub2.exe, PE32
42->110
dropped
112
C:\Users\user\AppData\Local\Temp\opee37.exe, PE32+
42->112
dropped
114
C:\Users\user\AppData\Local\Temp\kos1.exe, PE32
42->114
dropped
122
2 other malicious files
42->122
dropped
116
C:\Users\user\AppData\Local\...\gqgncgleb.dat, PE32+
44->116
dropped
68
cmd.exe
44->68
started
186
176.123.4.46, 33783, 49838
ALEXHOSTMD
Moldova Republic of
46->186
210
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
46->210
212
Found many strings related
to Crypto-Wallets (likely
being stolen)
46->212
214
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
46->214
222
2 other signatures
46->222
188
187.134.55.247
UninetSAdeCVMX
Mexico
51->188
190
211.171.233.126
LGDACOMLGDACOMCorporationKR
Korea Republic of
51->190
192
6 other IPs or domains
51->192
118
C:\Users\user\AppData\Roaming\cuiddgj, PE32
51->118
dropped
120
C:\Users\user\AppData\Local\Temp\13D1.exe, PE32
51->120
dropped
216
System process connects
to network (likely due
to code injection or
exploit)
51->216
218
Benign windows process
drops PE files
51->218
220
Hides that the sample
has been downloaded
from the Internet (zone.identifier)
51->220
70
control.exe
53->70
started
72
conhost.exe
53->72
started
file14
signatures15
process16
dnsIp17
162
server16.redhatsystems.com
57->162
164
server16.redhatsystems.com
185.82.216.64
ITL-BG
Bulgaria
57->164
166
4 other IPs or domains
57->166
124
C:\Windows\windefender.exe, PE32
57->124
dropped
126
C:\Users\user\AppData\Local\...\injector.exe, PE32+
57->126
dropped
128
C:\Users\...128tQuerySystemInformationHook.dll, PE32+
57->128
dropped
132
5 other malicious files
57->132
dropped
250
Uses schtasks.exe or
at.exe to add and modify
task schedules
57->250
76
powershell.exe
57->76
started
78
schtasks.exe
57->78
started
89
3 other processes
57->89
252
Uses netsh to modify
the Windows network
and firewall settings
62->252
80
netsh.exe
62->80
started
83
conhost.exe
62->83
started
85
conhost.exe
64->85
started
130
C:\Users\user\AppData\Local\...\fejwuae.exe, PE32
68->130
dropped
91
2 other processes
68->91
87
rundll32.exe
70->87
started
93
2 other processes
74->93
file18
254
Uses STUN server to
do NAT traversial
162->254
signatures19
process20
signatures21
95
conhost.exe
76->95
started
97
conhost.exe
78->97
started
194
Creates files in the
system32 config directory
80->194
196
Tries to detect sandboxes
/ dynamic malware analysis
system (file name check)
87->196
99
rundll32.exe
87->99
started
101
conhost.exe
89->101
started
103
conhost.exe
89->103
started
process22
process23
105
rundll32.exe
99->105
started
signatures24
248
Tries to detect sandboxes
/ dynamic malware analysis
system (file name check)
105->248
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.