Threat name:
Amadey, Cryptbot, Go Injector, PureLog S
Alert
Classification:
rans.troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
High number of junk calls founds (likely related to sandbox DOS / API hammering)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys stealer DLL
Yara detected Go Injector
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1494144
Sample:
file.exe
Startdate:
17/08/2024
Architecture:
WINDOWS
Score:
100
130
fivexc5pt.top
2->130
132
HJhaTjOPrjURhc.HJhaTjOPrjURhc
2->132
134
jSbXVBiItIINfreBHvLPHxDRe.jSbXVBiItIINfreBHvLPHxDRe
2->134
150
Multi AV Scanner detection
for domain / URL
2->150
152
Suricata IDS alerts
for network traffic
2->152
154
Found malware configuration
2->154
156
30 other signatures
2->156
11
axplong.exe
43
2->11
started
16
file.exe
5
2->16
started
18
axplong.exe
2->18
started
20
3 other processes
2->20
signatures3
process4
dnsIp5
144
185.215.113.16, 49737, 49738, 49740
WHOLESALECONNECTIONSNL
Portugal
11->144
146
185.196.11.123, 49741, 80
SIMPLECARRIERCH
Switzerland
11->146
118
C:\Users\user\AppData\...\mobiletrans.exe, PE32+
11->118
dropped
120
C:\Users\user\AppData\Local\...\runtime.exe, PE32
11->120
dropped
122
C:\Users\user\AppData\...\BattleGermany.exe, PE32
11->122
dropped
128
17 other malicious files
11->128
dropped
206
Hides threads from debuggers
11->206
208
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->208
210
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->210
22
BattleGermany.exe
11->22
started
26
stealc_default.exe
11->26
started
29
runtime.exe
11->29
started
33
6 other processes
11->33
124
C:\Users\user\AppData\Local\...\axplong.exe, PE32
16->124
dropped
126
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
16->126
dropped
212
Detected unpacking (changes
PE section rights)
16->212
214
Tries to evade debugger
and weak emulator (self
modifying code)
16->214
216
Tries to detect virtualization
through RDTSC time measurements
16->216
218
Potentially malicious
time measurement code
found
16->218
31
axplong.exe
16->31
started
220
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
20->220
file6
signatures7
process8
dnsIp9
100
C:\Users\user\AppData\Local\Temp\Tracked, data
22->100
dropped
112
7 other malicious files
22->112
dropped
180
Writes many files with
high entropy
22->180
35
cmd.exe
22->35
started
136
185.215.113.17, 49744, 80
WHOLESALECONNECTIONSNL
Portugal
26->136
102
C:\Users\user\AppData\...\softokn3[1].dll, PE32
26->102
dropped
104
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
26->104
dropped
106
C:\Users\user\AppData\...\mozglue[1].dll, PE32
26->106
dropped
114
9 other files (5 malicious)
26->114
dropped
182
Multi AV Scanner detection
for dropped file
26->182
184
Tries to steal Mail
credentials (via file
/ registry access)
26->184
186
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->186
200
4 other signatures
26->200
108
C:\Users\user\AppData\Local\Temp\Zinc, data
29->108
dropped
116
7 other malicious files
29->116
dropped
39
cmd.exe
29->39
started
188
Detected unpacking (changes
PE section rights)
31->188
190
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
31->190
192
Tries to evade debugger
and weak emulator (self
modifying code)
31->192
202
4 other signatures
31->202
138
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
33->138
140
fivexc5pt.top
80.249.145.88
SELECTELRU
Russian Federation
33->140
142
45.66.231.214, 49750, 9932
CMCSUS
Germany
33->142
110
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
33->110
dropped
194
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
33->194
196
Machine Learning detection
for dropped file
33->196
198
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
33->198
204
4 other signatures
33->204
41
RegAsm.exe
33->41
started
43
Hkbsse.exe
33->43
started
45
RegAsm.exe
1
18
33->45
started
48
2 other processes
33->48
file10
signatures11
process12
dnsIp13
92
C:\Users\user\AppData\Local\...\Community.pif, PE32
35->92
dropped
170
Drops PE files with
a suspicious file extension
35->170
172
Writes many files with
high entropy
35->172
50
Community.pif
35->50
started
54
cmd.exe
35->54
started
56
conhost.exe
35->56
started
68
7 other processes
35->68
94
C:\Users\user\AppData\Local\...\Beijing.pif, PE32
39->94
dropped
58
conhost.exe
39->58
started
60
tasklist.exe
39->60
started
62
findstr.exe
39->62
started
96
C:\Users\user\AppData\...\j82m6G03rX.exe, PE32
41->96
dropped
98
C:\Users\user\AppData\...\3QWxC5vo5d.exe, PE32
41->98
dropped
64
j82m6G03rX.exe
41->64
started
66
3QWxC5vo5d.exe
41->66
started
174
Multi AV Scanner detection
for dropped file
43->174
176
Machine Learning detection
for dropped file
43->176
148
20.52.165.210, 39030, 49739
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
45->148
178
Installs new ROOT certificates
45->178
file14
signatures15
process16
file17
84
C:\Users\user\AppData\Local\...\SkyPilot.pif, PE32
50->84
dropped
86
C:\Users\user\AppData\Local\...\SkyPilot.js, ASCII
50->86
dropped
88
C:\Users\user\AppData\Local\...\D, data
50->88
dropped
158
Drops PE files with
a suspicious file extension
50->158
160
Uses schtasks.exe or
at.exe to add and modify
task schedules
50->160
162
Writes to foreign memory
regions
50->162
168
2 other signatures
50->168
70
cmd.exe
50->70
started
72
schtasks.exe
50->72
started
90
C:\Users\user\AppData\Local\Temp\177479\s, data
54->90
dropped
164
Multi AV Scanner detection
for dropped file
64->164
166
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
64->166
74
conhost.exe
64->74
started
76
conhost.exe
66->76
started
signatures18
process19
process20
78
conhost.exe
70->78
started
80
schtasks.exe
70->80
started
82
conhost.exe
72->82
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.