Threat name:
AsyncRAT, Neshta, PureLog Stealer, RedLi
Alert
Classification:
spre.troj.spyw.evad
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Drops or copies MsMpEng.exe (Windows Defender, likely to bypass HIPS)
Drops PE files with a suspicious file extension
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ipconfig to lookup or modify the Windows network settings
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1489077
Sample:
rfQ3afwShz.exe
Startdate:
06/08/2024
Architecture:
WINDOWS
Score:
100
152
server.underground-cheat.xyz
2->152
154
gia.o7lab.me
2->154
156
3 other IPs or domains
2->156
184
Found malware configuration
2->184
186
Malicious sample detected
(through community Yara
rule)
2->186
188
Antivirus detection
for dropped file
2->188
192
30 other signatures
2->192
15
rfQ3afwShz.exe
1
6
2->15
started
19
powershell.exe
2->19
started
21
svchost.com
2->21
started
23
2 other processes
2->23
signatures3
190
Performs DNS queries
to domains with low
reputation
152->190
process4
file5
146
C:\Users\user\AppData\Local\Temp\pop3.exe, PE32
15->146
dropped
148
C:\Users\user\AppData\Local\Bqoqoaflz.exe, PE32
15->148
dropped
150
C:\Users\...\Bqoqoaflz.exe:Zone.Identifier, ASCII
15->150
dropped
162
Found many strings related
to Crypto-Wallets (likely
being stolen)
15->162
164
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
15->164
166
Writes to foreign memory
regions
15->166
25
InstallUtil.exe
4
6
15->25
started
30
cmd.exe
1
15->30
started
32
pop3.exe
2
15->32
started
34
cmd.exe
1
15->34
started
168
Modifies the context
of a thread in another
process (thread injection)
19->168
170
Found suspicious powershell
code related to unpacking
or dynamic code loading
19->170
172
Injects a PE file into
a foreign processes
19->172
36
dllhost.exe
19->36
started
38
conhost.exe
19->38
started
40
Bqoqoaflz.exe
21->40
started
42
svchost.com
23->42
started
44
2 other processes
23->44
signatures6
process7
dnsIp8
158
gia.o7lab.me
154.216.20.242, 26644, 49730, 49740
SKHT-ASShenzhenKatherineHengTechnologyInformationCo
Seychelles
25->158
140
C:\Users\user\AppData\Local\Temp\rehqmn.exe, PE32
25->140
dropped
142
C:\Users\user\AppData\Local\Temp\okngbd.exe, PE32
25->142
dropped
208
Found many strings related
to Crypto-Wallets (likely
being stolen)
25->208
46
cmd.exe
25->46
started
49
svchost.com
25->49
started
210
Suspicious powershell
command line found
30->210
212
Bypasses PowerShell
execution policy
30->212
214
Uses schtasks.exe or
at.exe to add and modify
task schedules
30->214
216
Uses ipconfig to lookup
or modify the Windows
network settings
30->216
55
2 other processes
30->55
160
blue.o7lab.me
45.66.231.202, 49731, 49746, 7777
CMCSUS
Germany
32->160
57
2 other processes
34->57
218
Injects code into the
Windows Explorer (explorer.exe)
36->218
220
Writes to foreign memory
regions
36->220
222
Creates a thread in
another existing process
(thread injection)
36->222
59
5 other processes
36->59
224
Injects a PE file into
a foreign processes
40->224
51
svchost.com
40->51
started
61
2 other processes
40->61
53
cmd.exe
42->53
started
63
2 other processes
44->63
file9
signatures10
process11
signatures12
226
Suspicious powershell
command line found
46->226
65
powershell.exe
46->65
started
67
conhost.exe
46->67
started
69
cmd.exe
49->69
started
72
cmd.exe
51->72
started
74
conhost.exe
53->74
started
76
ipconfig.exe
53->76
started
78
cmd.exe
61->78
started
process13
signatures14
80
okngbd.exe
65->80
started
194
Suspicious powershell
command line found
69->194
84
powershell.exe
69->84
started
86
conhost.exe
69->86
started
88
conhost.exe
72->88
started
90
ipconfig.exe
72->90
started
92
conhost.exe
78->92
started
94
ipconfig.exe
78->94
started
process15
file16
120
C:\Windows\svchost.com, PE32
80->120
dropped
122
C:\Users\user\AppData\Local\Temp\chrome.exe, PE32
80->122
dropped
124
C:\Users\user\AppData\Local\...\okngbd.exe, PE32
80->124
dropped
126
138 other malicious files
80->126
dropped
174
Creates an undocumented
autostart registry key
80->174
176
Drops PE files with
a suspicious file extension
80->176
178
Drops or copies MsMpEng.exe
(Windows Defender, likely
to bypass HIPS)
80->178
182
2 other signatures
80->182
96
okngbd.exe
80->96
started
180
Drops executables to
the windows directory
(C:\Windows) and
starts them
84->180
99
svchost.com
84->99
started
signatures17
process18
file19
128
C:\Users\user\AppData\Local\...\Install.exe, PE32
96->128
dropped
130
C:\Users\user\AppData\...\$77svchost.exe, PE32
96->130
dropped
101
svchost.com
96->101
started
105
Install.exe
96->105
started
107
rehqmn.exe
99->107
started
process20
file21
132
C:\...\maintenanceservice.exe, PE32
101->132
dropped
134
C:\Program Files (x86)\...\misc.exe, PE32
101->134
dropped
136
C:\Program Files (x86)\...\misc.exe, PE32
101->136
dropped
138
10 other malicious files
101->138
dropped
196
Sample is not signed
and drops a device driver
101->196
198
Infects executable files
(exe, dll, sys, html)
101->198
109
$77svchost.exe
101->109
started
200
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
107->200
202
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
107->202
204
Tries to harvest and
steal browser information
(history, passwords,
etc)
107->204
206
Tries to steal Crypto
Currency Wallets
107->206
112
conhost.exe
107->112
started
signatures22
process23
file24
144
C:\Users\user\AppData\Roaming\WinUpdate.exe, PE32
109->144
dropped
114
svchost.com
109->114
started
116
cmd.exe
109->116
started
process25
process26
118
cmd.exe
114->118
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.