Threat name:
Amadey, PureLog Stealer, RedLine, zgRAT
Alert
Classification:
troj.spyw.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Potential dropper URLs found in powershell memory
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1378941
Sample:
x5e0c6nlpQ.exe
Startdate:
22/01/2024
Architecture:
WINDOWS
Score:
100
112
www.fleefight.it
2->112
114
menuesqr.com.ar
2->114
142
Snort IDS alert for
network traffic
2->142
144
Found malware configuration
2->144
146
Malicious sample detected
(through community Yara
rule)
2->146
148
20 other signatures
2->148
10
x5e0c6nlpQ.exe
1
5
2->10
started
14
clnt.exe
2->14
started
16
iojmibhyhiws.exe
2->16
started
18
4 other processes
2->18
signatures3
process4
file5
98
C:\Users\user\AppData\Local\...\explorhe.exe, PE32
10->98
dropped
160
Detected unpacking (changes
PE section rights)
10->160
162
Contains functionality
to detect sleep reduction
/ modifications
10->162
20
explorhe.exe
45
10->20
started
164
Multi AV Scanner detection
for dropped file
14->164
166
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
14->166
168
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
14->168
170
Encrypted powershell
cmdline option found
14->170
25
cmd.exe
14->25
started
172
Antivirus detection
for dropped file
16->172
174
Tries to evade debugger
and weak emulator (self
modifying code)
16->174
27
cmd.exe
18->27
started
signatures6
process7
dnsIp8
116
185.215.113.68, 49704, 49705, 49707
WHOLESALECONNECTIONSNL
Portugal
20->116
118
menuesqr.com.ar
54.39.143.244, 443, 49711, 49713
OVHFR
Canada
20->118
120
www.fleefight.it
94.177.48.37, 443, 49706, 49709
OLISAT-ASRO
Romania
20->120
88
C:\Users\user\AppData\Roaming\...\clip64.dll, PE32
20->88
dropped
90
C:\Users\user\AppData\Local\...\flesh.exe, PE32
20->90
dropped
92
C:\Users\user\AppData\...\pixelcloudnew2.exe, PE32
20->92
dropped
94
17 other malicious files
20->94
dropped
150
Multi AV Scanner detection
for dropped file
20->150
152
Detected unpacking (changes
PE section rights)
20->152
154
Creates an undocumented
autostart registry key
20->154
156
5 other signatures
20->156
29
Zjqkz.exe
3
20->29
started
33
crypted.exe
20->33
started
35
gold1234.exe
20->35
started
45
7 other processes
20->45
37
clnt.exe
25->37
started
39
conhost.exe
25->39
started
41
clnt.exe
27->41
started
43
conhost.exe
27->43
started
file9
signatures10
process11
dnsIp12
100
C:\Users\user\AppData\Roaming\clnt.exe, PE32
29->100
dropped
176
Multi AV Scanner detection
for dropped file
29->176
178
Queries sensitive physical
memory information (via
WMI, Win32_PhysicalMemory,
often done to detect
virtual machines)
29->178
180
Found many strings related
to Crypto-Wallets (likely
being stolen)
29->180
198
4 other signatures
29->198
48
Zjqkz.exe
29->48
started
52
powershell.exe
29->52
started
182
Machine Learning detection
for dropped file
33->182
184
Writes to foreign memory
regions
33->184
186
Allocates memory in
foreign processes
33->186
54
RegAsm.exe
33->54
started
188
Injects a PE file into
a foreign processes
35->188
57
RegAsm.exe
35->57
started
190
Encrypted powershell
cmdline option found
37->190
63
3 other processes
37->63
65
2 other processes
41->65
122
94.156.66.203, 13781, 49738
TERASYST-ASBG
Bulgaria
45->122
124
80.79.4.61, 18236, 49718
SISTEMEMD
Moldova Republic of
45->124
126
5.42.65.31
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
45->126
102
C:\ProgramData\...\iojmibhyhiws.exe, PE32+
45->102
dropped
192
Antivirus detection
for dropped file
45->192
194
System process connects
to network (likely due
to code injection or
exploit)
45->194
196
Detected unpacking (changes
PE section rights)
45->196
200
4 other signatures
45->200
59
RegAsm.exe
45->59
started
61
cmd.exe
45->61
started
67
6 other processes
45->67
file13
signatures14
process15
dnsIp16
104
64.52.171.220
CLOUD-SOUTHUS
United States
48->104
128
Tries to harvest and
steal Bitcoin Wallet
information
48->128
130
Potential dropper URLs
found in powershell
memory
52->130
69
conhost.exe
52->69
started
106
144.76.1.85, 25894, 49719
HETZNER-ASDE
Germany
54->106
96
C:\Users\user\AppData\Local\...\qemu-ga.exe, PE32
54->96
dropped
132
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
54->132
134
Found many strings related
to Crypto-Wallets (likely
being stolen)
54->134
136
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
54->136
71
qemu-ga.exe
54->71
started
108
20.113.35.45, 38357, 49722
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
57->108
138
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
57->138
140
Tries to steal Crypto
Currency Wallets
57->140
110
141.95.211.148, 46011, 49728
DFNVereinzurFoerderungeinesDeutschenForschungsnetzese
Germany
59->110
86
2 other processes
61->86
74
conhost.exe
63->74
started
76
conhost.exe
65->76
started
78
conhost.exe
67->78
started
80
conhost.exe
67->80
started
82
conhost.exe
67->82
started
84
conhost.exe
67->84
started
file17
signatures18
process19
signatures20
158
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
71->158
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.