Threat name:
Python Stealer, Blank Grabber, CStealer,
Alert
Classification:
rans.troj.spyw.evad
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Drops PE files with benign system names
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found pyInstaller with non standard icon
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Modifies Windows Defender protection settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Capture Wi-Fi password
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Startup Folder Persistence
Sigma detected: System File Execution Location Anomaly
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Very long command line found
Writes or reads registry keys via WMI
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected Costura Assembly Loader
Yara detected Discord Token Stealer
Yara detected Generic Python Stealer
Yara detected Millenuim RAT
Yara detected Telegram RAT
Yara detected Telegram Recon
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1439028
Sample:
DevxExecutor.exe
Startdate:
09/05/2024
Architecture:
WINDOWS
Score:
100
165
api.telegram.org
2->165
167
raw.githubusercontent.com
2->167
169
2 other IPs or domains
2->169
197
Multi AV Scanner detection
for domain / URL
2->197
199
Antivirus detection
for URL or domain
2->199
201
Antivirus detection
for dropped file
2->201
205
26 other signatures
2->205
15
DevxExecutor.exe
4
2->15
started
18
powershell.exe
2->18
started
signatures3
203
Uses the Telegram API
(likely for C&C
communication)
165->203
process4
file5
161
C:\Users\user\AppData\Local\Temp\main.exe, PE32+
15->161
dropped
163
C:\Users\user\AppData\Local\...\cstealer.exe, PE32+
15->163
dropped
21
main.exe
13
15->21
started
25
cstealer.exe
25
15->25
started
175
Loading BitLocker PowerShell
Module
18->175
27
conhost.exe
18->27
started
29
WmiPrvSE.exe
18->29
started
signatures6
process7
file8
125
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
21->125
dropped
127
C:\Users\user\AppData\Local\...\select.pyd, PE32+
21->127
dropped
129
C:\Users\user\AppData\Local\...\python311.dll, PE32+
21->129
dropped
137
8 other malicious files
21->137
dropped
225
Found pyInstaller with
non standard icon
21->225
31
main.exe
21->31
started
131
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
25->131
dropped
133
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
25->133
dropped
135
C:\Users\user\AppData\Local\...\select.pyd, PE32+
25->135
dropped
139
16 other malicious files
25->139
dropped
227
Potentially malicious
time measurement code
found
25->227
33
cstealer.exe
25->33
started
signatures9
process10
process11
35
cmd.exe
1
31->35
started
37
cmd.exe
1
33->37
started
signatures12
40
Build.exe
6
35->40
started
43
conhost.exe
35->43
started
217
Very long command line
found
37->217
219
Encrypted powershell
cmdline option found
37->219
221
Bypasses PowerShell
execution policy
37->221
223
4 other signatures
37->223
45
cstealer.exe
25
37->45
started
47
conhost.exe
37->47
started
process13
file14
141
C:\ProgramData\Microsoft\hacn.exe, PE32+
40->141
dropped
143
C:\ProgramData\Microsoft\based.exe, PE32+
40->143
dropped
49
hacn.exe
40->49
started
53
based.exe
40->53
started
145
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
45->145
dropped
147
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
45->147
dropped
149
C:\Users\user\AppData\Local\...\select.pyd, PE32+
45->149
dropped
151
16 other malicious files
45->151
dropped
55
cstealer.exe
45->55
started
process15
file16
103
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
49->103
dropped
105
C:\Users\user\AppData\Local\...\select.pyd, PE32+
49->105
dropped
107
C:\Users\user\AppData\Local\Temp\...\s.exe, PE32
49->107
dropped
115
8 other files (7 malicious)
49->115
dropped
177
Multi AV Scanner detection
for dropped file
49->177
179
Machine Learning detection
for dropped file
49->179
57
hacn.exe
49->57
started
109
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
53->109
dropped
111
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
53->111
dropped
113
C:\Users\user\AppData\Local\...\select.pyd, PE32+
53->113
dropped
117
16 other malicious files
53->117
dropped
181
Very long command line
found
53->181
183
Modifies Windows Defender
protection settings
53->183
185
Adds a directory exclusion
to Windows Defender
53->185
187
2 other signatures
53->187
59
based.exe
53->59
started
63
cmd.exe
1
55->63
started
signatures17
process18
dnsIp19
65
cmd.exe
57->65
started
171
api.telegram.org
149.154.167.220, 443, 49746
TELEGRAMRU
United Kingdom
59->171
173
discord.com
162.159.138.232, 443, 49742
CLOUDFLARENETUS
United States
59->173
229
Very long command line
found
59->229
231
Tries to harvest and
steal browser information
(history, passwords,
etc)
59->231
233
Modifies Windows Defender
protection settings
59->233
235
5 other signatures
59->235
67
cmd.exe
59->67
started
70
cmd.exe
59->70
started
72
cmd.exe
59->72
started
79
16 other processes
59->79
74
cstealer.exe
25
63->74
started
77
conhost.exe
63->77
started
signatures20
process21
file22
81
s.exe
65->81
started
85
conhost.exe
65->85
started
207
Adds a directory exclusion
to Windows Defender
67->207
87
powershell.exe
67->87
started
89
conhost.exe
67->89
started
209
Modifies Windows Defender
protection settings
70->209
95
2 other processes
70->95
97
2 other processes
72->97
153
C:\Users\user\AppData\...\unicodedata.pyd, PE32+
74->153
dropped
155
C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+
74->155
dropped
157
C:\Users\user\AppData\Local\...\select.pyd, PE32+
74->157
dropped
159
16 other malicious files
74->159
dropped
91
cstealer.exe
74->91
started
211
Very long command line
found
79->211
213
Encrypted powershell
cmdline option found
79->213
215
Tries to harvest and
steal WLAN passwords
79->215
93
getmac.exe
79->93
started
99
29 other processes
79->99
signatures23
process24
file25
119
C:\ProgramData\svchost.exe, PE32+
81->119
dropped
121
C:\ProgramData\setup.exe, PE32+
81->121
dropped
123
C:\ProgramData\main.exe, PE32
81->123
dropped
189
Drops PE files with
benign system names
81->189
191
Loading BitLocker PowerShell
Module
87->191
101
cmd.exe
91->101
started
193
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
93->193
195
Writes or reads registry
keys via WMI
93->195
signatures26
process27
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.