Threat name:
Amadey, Glupteba, PureLog Stealer, RedLi
Alert
Classification:
troj.spyw.evad.mine
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected Stratum mining protocol
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1386110
Sample:
aXv0VxfPWu.exe
Startdate:
03/02/2024
Architecture:
WINDOWS
Score:
100
134
secretionsuitcasenioise.shop
2->134
136
mealroomrallpassiveer.shop
2->136
138
5 other IPs or domains
2->138
186
Snort IDS alert for
network traffic
2->186
188
Multi AV Scanner detection
for domain / URL
2->188
190
Found malware configuration
2->190
192
24 other signatures
2->192
12
aXv0VxfPWu.exe
1
5
2->12
started
16
iojmibhyhiws.exe
2->16
started
18
uwgxswmtctao.exe
1
2->18
started
20
2 other processes
2->20
signatures3
process4
file5
114
C:\Users\user\AppData\Local\...\explorhe.exe, PE32
12->114
dropped
234
Detected unpacking (changes
PE section rights)
12->234
236
Contains functionality
to detect sleep reduction
/ modifications
12->236
22
explorhe.exe
44
12->22
started
116
C:\Windows\Temp\zamrbllfjgdb.sys, PE32+
16->116
dropped
238
Antivirus detection
for dropped file
16->238
240
Multi AV Scanner detection
for dropped file
16->240
242
Modifies the context
of a thread in another
process (thread injection)
16->242
244
Tries to evade debugger
and weak emulator (self
modifying code)
16->244
27
conhost.exe
16->27
started
29
conhost.exe
16->29
started
118
C:\Windows\Temp\rljxappkaarw.sys, PE32+
18->118
dropped
246
Injects code into the
Windows Explorer (explorer.exe)
18->246
248
Sample is not signed
and drops a device driver
18->248
31
explorer.exe
18->31
started
33
conhost.exe
20->33
started
signatures6
process7
dnsIp8
142
185.215.113.68, 49729, 49730, 49732
WHOLESALECONNECTIONSNL
Portugal
22->142
144
109.107.182.3, 49731, 49734, 49737
TELEPORT-TV-ASRU
Russian Federation
22->144
146
185.172.128.19, 49742, 80
NADYMSS-ASRU
Russian Federation
22->146
106
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
22->106
dropped
108
C:\Users\user\AppData\Local\...\crypted.exe, PE32
22->108
dropped
110
C:\Users\user\AppData\Local\Temp\...\alex.exe, PE32
22->110
dropped
112
17 other malicious files
22->112
dropped
220
Multi AV Scanner detection
for dropped file
22->220
222
Detected unpacking (changes
PE section rights)
22->222
224
Creates an undocumented
autostart registry key
22->224
232
4 other signatures
22->232
35
dayroc.exe
22->35
started
39
goldklassd.exe
22->39
started
41
crypted.exe
22->41
started
43
8 other processes
22->43
226
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
27->226
148
142.202.242.45, 49735, 80
1GSERVERSUS
Reserved
31->148
228
System process connects
to network (likely due
to code injection or
exploit)
31->228
230
Query firmware table
information (likely
to detect VMs)
31->230
file9
signatures10
process11
dnsIp12
88
C:\Users\user\AppData\Local\...\toolspub1.exe, PE32
35->88
dropped
90
C:\...\d21cbe21e38b385a41a68c5e6dd32f4c.exe, PE32
35->90
dropped
92
C:\Users\user\AppData\...\InstallSetup9.exe, PE32
35->92
dropped
194
Multi AV Scanner detection
for dropped file
35->194
46
InstallSetup9.exe
35->46
started
51
toolspub1.exe
35->51
started
53
d21cbe21e38b385a41a68c5e6dd32f4c.exe
35->53
started
196
Writes to foreign memory
regions
39->196
198
Allocates memory in
foreign processes
39->198
200
Injects a PE file into
a foreign processes
39->200
55
RegAsm.exe
39->55
started
57
conhost.exe
39->57
started
59
RegAsm.exe
41->59
started
150
80.79.4.61
SISTEMEMD
Moldova Republic of
43->150
152
45.15.156.209
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
43->152
94
C:\ProgramData\...\uwgxswmtctao.exe, PE32+
43->94
dropped
96
C:\ProgramData\...\iojmibhyhiws.exe, PE32+
43->96
dropped
202
System process connects
to network (likely due
to code injection or
exploit)
43->202
204
Detected unpacking (changes
PE section rights)
43->204
206
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
43->206
208
2 other signatures
43->208
61
RegAsm.exe
43->61
started
63
RegAsm.exe
43->63
started
65
11 other processes
43->65
file13
signatures14
process15
dnsIp16
154
185.172.128.90
NADYMSS-ASRU
Russian Federation
46->154
156
185.172.128.127
NADYMSS-ASRU
Russian Federation
46->156
120
C:\Users\user\AppData\Local\...\nst36EF.tmp, PE32
46->120
dropped
122
C:\Users\user\AppData\Local\...\INetC.dll, PE32
46->122
dropped
124
C:\Users\user\AppData\...\BroomSetup.exe, PE32
46->124
dropped
126
C:\Users\user\AppData\...\syncUpd[1].exe, PE32
46->126
dropped
168
Multi AV Scanner detection
for dropped file
46->168
67
nst36EF.tmp
46->67
started
72
BroomSetup.exe
46->72
started
170
Detected unpacking (changes
PE section rights)
51->170
172
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
51->172
174
Maps a DLL or memory
area into another process
51->174
184
2 other signatures
51->184
176
Detected unpacking (overwrites
its own PE header)
53->176
158
20.79.30.95, 33223, 49740
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
55->158
178
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
55->178
180
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
55->180
160
144.76.1.85
HETZNER-ASDE
Germany
59->160
128
C:\Users\user\AppData\Local\...\qemu-ga.exe, PE32
59->128
dropped
182
Tries to harvest and
steal browser information
(history, passwords,
etc)
59->182
130
C:\Users\user\AppData\Roaming\...\olehps.exe, PE32
61->130
dropped
132
C:\Users\user\AppData\Roaming\...\Logs.exe, PE32
61->132
dropped
162
secretionsuitcasenioise.shop
104.21.16.152
CLOUDFLARENETUS
United States
63->162
164
mealroomrallpassiveer.shop
104.21.47.178
CLOUDFLARENETUS
United States
63->164
166
3 other IPs or domains
63->166
74
conhost.exe
65->74
started
76
conhost.exe
65->76
started
78
conhost.exe
65->78
started
80
6 other processes
65->80
file17
signatures18
process19
dnsIp20
140
185.172.128.79
NADYMSS-ASRU
Russian Federation
67->140
98
C:\Users\user\AppData\...\softokn3[1].dll, PE32
67->98
dropped
100
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
67->100
dropped
102
C:\Users\user\AppData\...\mozglue[1].dll, PE32
67->102
dropped
104
9 other files (5 malicious)
67->104
dropped
210
Detected unpacking (changes
PE section rights)
67->210
212
Detected unpacking (overwrites
its own PE header)
67->212
214
Tries to steal Mail
credentials (via file
/ registry access)
67->214
218
2 other signatures
67->218
216
Multi AV Scanner detection
for dropped file
72->216
82
cmd.exe
72->82
started
file21
signatures22
process23
process24
84
conhost.exe
82->84
started
86
chcp.com
82->86
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.