Threat name:
Amadey, Babadeda, Discord Token Stealer,
Alert
Classification:
troj.spyw.evad.mine
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture screen (.Net source)
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected Discord Token Stealer
Yara detected Millenuim RAT
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected Xmrig cryptocurrency miner
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1331469
Sample:
file.exe
Startdate:
24/10/2023
Architecture:
WINDOWS
Score:
100
162
datasheet.fun
2->162
164
youtube-ui.l.google.com
2->164
166
10 other IPs or domains
2->166
188
Snort IDS alert for
network traffic
2->188
190
Found malware configuration
2->190
192
Malicious sample detected
(through community Yara
rule)
2->192
194
29 other signatures
2->194
15
file.exe
1
4
2->15
started
18
explothe.exe
2->18
started
signatures3
process4
file5
152
C:\Users\user\AppData\Local\...\jF3dl08.exe, PE32
15->152
dropped
154
C:\Users\user\AppData\Local\...\7XM4Ys25.exe, PE32
15->154
dropped
20
jF3dl08.exe
1
4
15->20
started
process6
file7
126
C:\Users\user\AppData\Local\...behaviorgraphU5lD08.exe, PE32
20->126
dropped
128
C:\Users\user\AppData\Local\...\6bO3qV6.exe, PE32
20->128
dropped
214
Antivirus detection
for dropped file
20->214
216
Machine Learning detection
for dropped file
20->216
24
GU5lD08.exe
1
4
20->24
started
28
6bO3qV6.exe
20->28
started
signatures8
process9
file10
142
C:\Users\user\AppData\Local\...\ff8hQ09.exe, PE32
24->142
dropped
144
C:\Users\user\AppData\Local\...\5Qf5VN2.exe, PE32
24->144
dropped
238
Antivirus detection
for dropped file
24->238
240
Machine Learning detection
for dropped file
24->240
30
ff8hQ09.exe
1
4
24->30
started
34
5Qf5VN2.exe
24->34
started
242
Multi AV Scanner detection
for dropped file
28->242
36
Conhost.exe
28->36
started
signatures11
process12
file13
146
C:\Users\user\AppData\Local\...\tQ4Ct24.exe, PE32
30->146
dropped
148
C:\Users\user\AppData\Local\...\4Kv029eK.exe, PE32
30->148
dropped
244
Antivirus detection
for dropped file
30->244
246
Machine Learning detection
for dropped file
30->246
38
tQ4Ct24.exe
1
4
30->38
started
42
4Kv029eK.exe
30->42
started
150
C:\Users\user\AppData\Local\...\explothe.exe, PE32
34->150
dropped
44
explothe.exe
34->44
started
signatures14
process15
dnsIp16
130
C:\Users\user\AppData\Local\...\Dx2cC84.exe, PE32
38->130
dropped
132
C:\Users\user\AppData\Local\...\3nd59wD.exe, PE32
38->132
dropped
218
Antivirus detection
for dropped file
38->218
220
Multi AV Scanner detection
for dropped file
38->220
222
Machine Learning detection
for dropped file
38->222
47
3nd59wD.exe
38->47
started
50
Dx2cC84.exe
1
4
38->50
started
224
Writes to foreign memory
regions
42->224
226
Allocates memory in
foreign processes
42->226
228
Injects a PE file into
a foreign processes
42->228
53
AppLaunch.exe
42->53
started
56
AppLaunch.exe
42->56
started
174
77.91.124.1, 49739, 49740, 49741
ECOTEL-ASRU
Russian Federation
44->174
134
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
44->134
dropped
136
C:\Users\user\AppData\Local\...\clip64[1].dll, PE32
44->136
dropped
230
Creates an undocumented
autostart registry key
44->230
232
Uses schtasks.exe or
at.exe to add and modify
task schedules
44->232
58
cmd.exe
44->58
started
60
schtasks.exe
44->60
started
62
rundll32.exe
44->62
started
file17
signatures18
process19
dnsIp20
248
Multi AV Scanner detection
for dropped file
47->248
250
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
47->250
252
Checks for kernel code
integrity (NtQuerySystemInformation(CodeIntegrityInformation))
47->252
256
3 other signatures
47->256
64
explorer.exe
39
28
47->64
injected
114
C:\Users\user\AppData\Local\...\2Qd9357.exe, PE32
50->114
dropped
116
C:\Users\user\AppData\Local\...\1EV04Vx4.exe, PE32
50->116
dropped
69
1EV04Vx4.exe
50->69
started
71
2Qd9357.exe
50->71
started
168
77.91.124.86, 19084, 49737, 49793
ECOTEL-ASRU
Russian Federation
53->168
254
Tries to harvest and
steal browser information
(history, passwords,
etc)
53->254
73
conhost.exe
58->73
started
75
cmd.exe
58->75
started
77
cacls.exe
58->77
started
81
4 other processes
58->81
79
conhost.exe
60->79
started
file21
signatures22
process23
dnsIp24
156
5.42.65.80, 49839, 80
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
64->156
158
77.91.68.249, 49788, 80
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
64->158
160
4 other IPs or domains
64->160
106
C:\Users\user\AppData\Local\Temp\F9C6.exe, PE32
64->106
dropped
108
C:\Users\user\AppData\Local\Temp\CED8.exe, PE32
64->108
dropped
110
C:\Users\user\AppData\Local\Temp\CA24.exe, PE32
64->110
dropped
112
9 other malicious files
64->112
dropped
176
System process connects
to network (likely due
to code injection or
exploit)
64->176
178
Benign windows process
drops PE files
64->178
83
7584.exe
64->83
started
87
77C7.exe
64->87
started
89
BackgroundTransferHost.exe
64->89
started
96
2 other processes
64->96
180
Contains functionality
to inject code into
remote processes
69->180
182
Writes to foreign memory
regions
69->182
184
Allocates memory in
foreign processes
69->184
92
AppLaunch.exe
9
1
69->92
started
186
Injects a PE file into
a foreign processes
71->186
94
AppLaunch.exe
12
71->94
started
file25
signatures26
process27
dnsIp28
122
C:\Users\user\AppData\Local\...\ZN3sQ1oC.exe, PE32
83->122
dropped
124
C:\Users\user\AppData\Local\...\6oa53rE.exe, PE32
83->124
dropped
200
Antivirus detection
for dropped file
83->200
202
Machine Learning detection
for dropped file
83->202
98
ZN3sQ1oC.exe
83->98
started
204
Multi AV Scanner detection
for dropped file
87->204
170
www.google.com
89->170
206
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
92->206
208
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
92->208
210
Modifies windows update
settings
92->210
212
2 other signatures
92->212
172
193.233.255.73, 49736, 49738, 49786
FREE-NET-ASFREEnetEU
Russian Federation
94->172
file29
signatures30
process31
file32
118
C:\Users\user\AppData\Local\...\pB7yi4De.exe, PE32
98->118
dropped
120
C:\Users\user\AppData\Local\...\5Dp74dU.exe, PE32
98->120
dropped
196
Antivirus detection
for dropped file
98->196
198
Machine Learning detection
for dropped file
98->198
102
pB7yi4De.exe
98->102
started
signatures33
process34
file35
138
C:\Users\user\AppData\Local\...\HI9Gu5FB.exe, PE32
102->138
dropped
140
C:\Users\user\AppData\Local\...\4Ij428gR.exe, PE32
102->140
dropped
234
Antivirus detection
for dropped file
102->234
236
Machine Learning detection
for dropped file
102->236
signatures36
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.