Threat name:
Amadey, Mars Stealer, PureLog Stealer, R
Alert
Classification:
phis.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files with benign system names
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Potentially malicious time measurement code found
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Schedule system process
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Mars stealer
Yara detected PureLog Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1414818
Sample:
SecuriteInfo.com.Win32.Troj...
Startdate:
25/03/2024
Architecture:
WINDOWS
Score:
100
193
Found malware configuration
2->193
195
Malicious sample detected
(through community Yara
rule)
2->195
197
Antivirus detection
for dropped file
2->197
199
29 other signatures
2->199
9
chrosha.exe
2->9
started
14
explorha.exe
1
25
2->14
started
16
RageMP131.exe
2->16
started
18
6 other processes
2->18
process3
dnsIp4
169
185.172.128.19
NADYMSS-ASRU
Russian Federation
9->169
171
193.233.132.216
FREE-NET-ASFREEnetEU
Russian Federation
9->171
127
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
9->127
dropped
129
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
9->129
dropped
137
8 other malicious files
9->137
dropped
243
Creates multiple autostart
registry keys
9->243
20
file300un.exe
9->20
started
24
boom8.exe
9->24
started
27
rundll32.exe
9->27
started
29
rundll32.exe
9->29
started
173
193.233.132.167
FREE-NET-ASFREEnetEU
Russian Federation
14->173
175
193.233.132.56
FREE-NET-ASFREEnetEU
Russian Federation
14->175
131
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
14->131
dropped
133
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
14->133
dropped
139
7 other malicious files
14->139
dropped
245
Detected unpacking (changes
PE section rights)
14->245
247
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
14->247
249
Tries to evade debugger
and weak emulator (self
modifying code)
14->249
263
5 other signatures
14->263
31
83047db55c.exe
14->31
started
33
rundll32.exe
14->33
started
39
3 other processes
14->39
135
C:\Users\user\...135kMVBwFvD1a2GcaZSl5_.exe, PE32
16->135
dropped
141
7 other malicious files
16->141
dropped
251
Binary is likely a compiled
AutoIt script file
16->251
253
Tries to steal Mail
credentials (via file
/ registry access)
16->253
255
Tries to harvest and
steal browser information
(history, passwords,
etc)
16->255
177
104.18.146.235
CLOUDFLARENETUS
United States
18->177
179
172.67.75.166
CLOUDFLARENETUS
United States
18->179
143
3 other malicious files
18->143
dropped
257
Multi AV Scanner detection
for dropped file
18->257
259
Machine Learning detection
for dropped file
18->259
261
Found stalling execution
ending in API Sleep
call
18->261
265
5 other signatures
18->265
35
explorha.exe
18->35
started
37
powershell.exe
18->37
started
file5
signatures6
process7
dnsIp8
109
C:\Users\user\.BLRVzdv\svchost.exe, PE32+
20->109
dropped
217
Creates multiple autostart
registry keys
20->217
219
Writes to foreign memory
regions
20->219
221
Allocates memory in
foreign processes
20->221
239
4 other signatures
20->239
41
AddInProcess32.exe
20->41
started
46
powershell.exe
20->46
started
48
cmd.exe
20->48
started
157
81.94.159.197
WESTCALL-ASRU
Russian Federation
24->157
159
185.172.128.144
NADYMSS-ASRU
Russian Federation
24->159
167
2 other IPs or domains
24->167
111
C:\...\4767d2e713f2021e8fe856e3ea638b58.exe, PE32
24->111
dropped
113
C:\Users\user\AppData\Local\...\toolspub1.exe, PE32
24->113
dropped
115
C:\Users\user\AppData\Local\...\ISetup8.exe, PE32
24->115
dropped
123
3 other malicious files
24->123
dropped
223
Creates an undocumented
autostart registry key
24->223
50
ISetup8.exe
24->50
started
52
toolspub1.exe
24->52
started
54
schtasks.exe
24->54
started
56
rundll32.exe
27->56
started
225
System process connects
to network (likely due
to code injection or
exploit)
29->225
161
34.117.186.192
GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
United States
31->161
163
193.233.132.74
FREE-NET-ASFREEnetEU
Russian Federation
31->163
165
104.26.5.15
CLOUDFLARENETUS
United States
31->165
117
C:\Users\user\...\teCjdyYTnXUcHsr1kQci.exe, PE32
31->117
dropped
119
C:\Users\user\...\biGBU2EaIF3Uxg5mVznC.exe, PE32
31->119
dropped
125
10 other malicious files
31->125
dropped
227
Detected unpacking (changes
PE section rights)
31->227
229
Binary is likely a compiled
AutoIt script file
31->229
231
Tries to steal Mail
credentials (via file
/ registry access)
31->231
241
5 other signatures
31->241
60
2 other processes
31->60
58
rundll32.exe
25
33->58
started
233
Hides threads from debuggers
35->233
235
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
35->235
237
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
35->237
121
C:\Users\user\AppData\Local\...\chrosha.exe, PE32
39->121
dropped
file9
signatures10
process11
dnsIp12
181
176.120.64.84
SPACENET-ASInternetServiceProviderRU
Russian Federation
41->181
183
107.167.110.211
OPERASOFTWAREUS
United States
41->183
189
15 other IPs or domains
41->189
145
C:\Users\...\ybo81Gvd4SgbR1cKMg8gyI2s.exe, PE32+
41->145
dropped
147
C:\Users\...\yP1kIPqyh8pOLlcwuNGZJBhc.exe, PE32
41->147
dropped
149
C:\Users\...\xj8zaai61MLpGRywq6D6DMdN.exe, PE32
41->149
dropped
155
184 other malicious files
41->155
dropped
267
Creates HTML files with
.exe extension (expired
dropper behavior)
41->267
66
6 other processes
41->66
70
2 other processes
46->70
72
2 other processes
48->72
185
185.172.128.65
NADYMSS-ASRU
Russian Federation
50->185
187
185.172.128.90
NADYMSS-ASRU
Russian Federation
50->187
151
C:\Users\user\AppData\Local\Temp\u4zc.1.exe, PE32
50->151
dropped
153
C:\Users\user\AppData\Local\Temp\u4zc.0.exe, PE32
50->153
dropped
269
Detected unpacking (changes
PE section rights)
50->269
271
Detected unpacking (overwrites
its own PE header)
50->271
74
2 other processes
50->74
273
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
52->273
275
Maps a DLL or memory
area into another process
52->275
277
Checks if the current
machine is a virtual
machine (disk enumeration)
52->277
279
Creates a thread in
another existing process
(thread injection)
52->279
62
explorer.exe
52->62
injected
64
conhost.exe
54->64
started
281
Tries to harvest and
steal ftp login credentials
56->281
283
Tries to harvest and
steal browser information
(history, passwords,
etc)
56->283
77
2 other processes
56->77
285
Tries to steal Instant
Messenger accounts or
passwords
58->285
287
Uses netsh to modify
the Windows network
and firewall settings
58->287
289
Tries to harvest and
steal WLAN passwords
58->289
79
2 other processes
58->79
81
2 other processes
60->81
file13
signatures14
process15
dnsIp16
91
C:\Users\user\AppData\Local\Temp\u6po.1.exe, PE32
66->91
dropped
93
C:\Users\user\AppData\Local\Temp\u6po.0.exe, PE32
66->93
dropped
95
C:\Users\user\AppData\Local\Temp\u6no.1.exe, PE32
66->95
dropped
105
7 other malicious files
66->105
dropped
201
Writes to foreign memory
regions
66->201
203
Allocates memory in
foreign processes
66->203
205
Injects a PE file into
a foreign processes
66->205
191
185.172.128.209
NADYMSS-ASRU
Russian Federation
74->191
97
C:\Users\user\AppData\...\softokn3[1].dll, PE32
74->97
dropped
99
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
74->99
dropped
101
C:\Users\user\AppData\...\mozglue[1].dll, PE32
74->101
dropped
107
9 other files (5 malicious)
74->107
dropped
207
Detected unpacking (changes
PE section rights)
74->207
209
Detected unpacking (overwrites
its own PE header)
74->209
211
Tries to harvest and
steal ftp login credentials
74->211
215
3 other signatures
74->215
83
conhost.exe
77->83
started
85
conhost.exe
77->85
started
103
C:\Users\user\...\246122658369_Desktop.zip, Zip
79->103
dropped
213
Found many strings related
to Crypto-Wallets (likely
being stolen)
79->213
87
conhost.exe
79->87
started
89
conhost.exe
79->89
started
file17
signatures18
process19
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.