Threat name:
Amadey, Mars Stealer, RisePro Stealer, S
Alert
Classification:
phis.troj.spyw.evad
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Mars stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1410423
Sample:
g8DU6moaZ0.exe
Startdate:
17/03/2024
Architecture:
WINDOWS
Score:
100
141
parrotflight.com
2->141
143
m2reg.ulm.ac.id
2->143
145
5 other IPs or domains
2->145
185
Snort IDS alert for
network traffic
2->185
187
Found malware configuration
2->187
189
Malicious sample detected
(through community Yara
rule)
2->189
191
22 other signatures
2->191
12
g8DU6moaZ0.exe
3
94
2->12
started
17
MPGPH131.exe
1
2->17
started
19
MPGPH131.exe
74
2->19
started
21
12 other processes
2->21
signatures3
process4
dnsIp5
149
185.172.128.19
NADYMSS-ASRU
Russian Federation
12->149
151
193.233.132.62, 49729, 49730, 49731
FREE-NET-ASFREEnetEU
Russian Federation
12->151
153
3 other IPs or domains
12->153
107
C:\Users\user\...\yxsixBLQgELIgU22InSU.exe, PE32
12->107
dropped
109
C:\Users\user\...\LaW0PqOJYBbDWWR1GA8n.exe, PE32
12->109
dropped
111
C:\Users\user\...\2qS7XDh9y9bMUhnpHAeQ.exe, PE32
12->111
dropped
119
12 other malicious files
12->119
dropped
215
Detected unpacking (changes
PE section rights)
12->215
217
Tries to steal Mail
credentials (via file
/ registry access)
12->217
219
Found many strings related
to Crypto-Wallets (likely
being stolen)
12->219
237
5 other signatures
12->237
23
2qS7XDh9y9bMUhnpHAeQ.exe
12->23
started
27
yxsixBLQgELIgU22InSU.exe
12->27
started
42
6 other processes
12->42
113
C:\Users\user\...\kgTSRp7aBcdlhPfimj0i.exe, PE32
17->113
dropped
115
C:\Users\user\...\dzqgAluPNeC4OQ_1qFJM.exe, PE32
17->115
dropped
117
C:\Users\user\...\DYgN4Y2XfutFgJ9XIv74.exe, PE32
17->117
dropped
121
4 other malicious files
17->121
dropped
221
Tries to harvest and
steal browser information
(history, passwords,
etc)
17->221
223
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
17->223
29
dzqgAluPNeC4OQ_1qFJM.exe
17->29
started
32
DYgN4Y2XfutFgJ9XIv74.exe
17->32
started
34
kgTSRp7aBcdlhPfimj0i.exe
17->34
started
123
7 other malicious files
19->123
dropped
225
Multi AV Scanner detection
for dropped file
19->225
227
Machine Learning detection
for dropped file
19->227
229
Found stalling execution
ending in API Sleep
call
19->229
36
QhGgLc7bBG38qX6XQPgH.exe
19->36
started
38
ZmERLZBK9QKErQd1QOis.exe
19->38
started
40
i0sbY4auaNgrDtSFzUhJ.exe
19->40
started
231
Antivirus detection
for dropped file
21->231
233
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
21->233
235
Tries to evade debugger
and weak emulator (self
modifying code)
21->235
239
2 other signatures
21->239
file6
signatures7
process8
dnsIp9
89
C:\Users\user\AppData\Local\...\explorha.exe, PE32
23->89
dropped
193
Detected unpacking (changes
PE section rights)
23->193
195
Tries to evade debugger
and weak emulator (self
modifying code)
23->195
197
Hides threads from debuggers
23->197
44
explorha.exe
23->44
started
161
galandskiyher5.com
81.94.159.197
WESTCALL-ASRU
Russian Federation
29->161
163
185.172.128.126
NADYMSS-ASRU
Russian Federation
29->163
165
2 other IPs or domains
29->165
91
C:\Users\user\AppData\Local\...\FirstZ.exe, PE32+
29->91
dropped
93
C:\...\4767d2e713f2021e8fe856e3ea638b58.exe, PE32
29->93
dropped
95
C:\Users\user\AppData\Local\...\toolspub1.exe, PE32
29->95
dropped
97
5 other malicious files
29->97
dropped
199
Multi AV Scanner detection
for dropped file
29->199
201
Creates an undocumented
autostart registry key
29->201
49
InstallSetup8.exe
29->49
started
51
toolspub1.exe
29->51
started
53
schtasks.exe
29->53
started
203
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
36->203
205
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
36->205
55
conhost.exe
42->55
started
57
conhost.exe
42->57
started
59
conhost.exe
42->59
started
61
3 other processes
42->61
file10
signatures11
process12
dnsIp13
155
193.233.132.56
FREE-NET-ASFREEnetEU
Russian Federation
44->155
125
C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+
44->125
dropped
127
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
44->127
dropped
129
C:\Users\user\AppData\...\a0635a0aca.exe, PE32
44->129
dropped
137
3 other malicious files
44->137
dropped
241
Detected unpacking (changes
PE section rights)
44->241
243
Creates multiple autostart
registry keys
44->243
245
Tries to evade debugger
and weak emulator (self
modifying code)
44->245
255
3 other signatures
44->255
63
rundll32.exe
44->63
started
65
a0635a0aca.exe
44->65
started
68
rundll32.exe
44->68
started
157
185.172.128.187
NADYMSS-ASRU
Russian Federation
49->157
159
185.172.128.90
NADYMSS-ASRU
Russian Federation
49->159
131
C:\Users\user\AppData\Local\...\syncUpd.exe, PE32
49->131
dropped
133
C:\Users\user\AppData\Local\...\INetC.dll, PE32
49->133
dropped
135
C:\Users\user\AppData\...\BroomSetup.exe, PE32
49->135
dropped
70
syncUpd.exe
49->70
started
247
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
51->247
249
Maps a DLL or memory
area into another process
51->249
251
Checks if the current
machine is a virtual
machine (disk enumeration)
51->251
253
Creates a thread in
another existing process
(thread injection)
51->253
74
conhost.exe
53->74
started
file14
signatures15
process16
dnsIp17
76
rundll32.exe
63->76
started
169
Multi AV Scanner detection
for dropped file
65->169
171
Tries to evade debugger
and weak emulator (self
modifying code)
65->171
173
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
65->173
175
System process connects
to network (likely due
to code injection or
exploit)
68->175
147
185.172.128.145
NADYMSS-ASRU
Russian Federation
70->147
99
C:\Users\user\AppData\...\softokn3[1].dll, PE32
70->99
dropped
101
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
70->101
dropped
103
C:\Users\user\AppData\...\mozglue[1].dll, PE32
70->103
dropped
105
9 other files (5 malicious)
70->105
dropped
177
Detected unpacking (changes
PE section rights)
70->177
179
Detected unpacking (overwrites
its own PE header)
70->179
181
Found many strings related
to Crypto-Wallets (likely
being stolen)
70->181
183
4 other signatures
70->183
file18
signatures19
process20
signatures21
207
Tries to steal Instant
Messenger accounts or
passwords
76->207
209
Uses netsh to modify
the Windows network
and firewall settings
76->209
211
Tries to harvest and
steal ftp login credentials
76->211
213
2 other signatures
76->213
79
powershell.exe
76->79
started
83
netsh.exe
76->83
started
process22
file23
139
C:\Users\user\...\246122658369_Desktop.zip, Zip
79->139
dropped
167
Found many strings related
to Crypto-Wallets (likely
being stolen)
79->167
85
conhost.exe
79->85
started
87
conhost.exe
83->87
started
signatures24
process25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.