Threat name:
Python Stealer, Amadey, Monster Stealer,
Alert
Classification:
troj.spyw.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to inject code into remote processes
Detected generic credential text file
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Gathers network related connection and port information
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Capture Wi-Fi password
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Generic Python Stealer
Yara detected Monster Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1457328
Sample:
KmhrN2q5ZO.exe
Startdate:
14/06/2024
Architecture:
WINDOWS
Score:
100
156
Found malware configuration
2->156
158
Malicious sample detected
(through community Yara
rule)
2->158
160
Antivirus detection
for dropped file
2->160
162
16 other signatures
2->162
11
KmhrN2q5ZO.exe
5
2->11
started
15
svchost.exe
2->15
started
17
svchost.exe
2->17
started
19
5 other processes
2->19
process3
dnsIp4
100
C:\Users\user\AppData\Local\...\axplong.exe, PE32
11->100
dropped
102
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
11->102
dropped
188
Detected unpacking (changes
PE section rights)
11->188
190
Tries to evade debugger
and weak emulator (self
modifying code)
11->190
192
Tries to detect virtualization
through RDTSC time measurements
11->192
198
3 other signatures
11->198
22
axplong.exe
40
11->22
started
27
SetupWizard.exe
15->27
started
194
Changes security center
settings (notifications,
updates, antivirus,
firewall)
17->194
140
23.43.61.160
AKAMAI-ASN1EU
United States
19->140
196
Query firmware table
information (likely
to detect VMs)
19->196
file5
signatures6
process7
dnsIp8
142
185.172.128.19
NADYMSS-ASRU
Russian Federation
22->142
144
77.91.77.81
FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
Russian Federation
22->144
90
C:\Users\user\AppData\Local\...90ewKindR.exe, PE32
22->90
dropped
92
C:\Users\user\AppData\...\drivermanager.exe, PE32
22->92
dropped
94
C:\Users\user\AppData\...\onecommander.exe, PE32+
22->94
dropped
98
15 other malicious files
22->98
dropped
180
Multi AV Scanner detection
for dropped file
22->180
182
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
22->182
184
Tries to evade debugger
and weak emulator (self
modifying code)
22->184
186
3 other signatures
22->186
29
judit.exe
47
22->29
started
33
setup222.exe
22->33
started
36
upd.exe
22->36
started
40
3 other processes
22->40
96
C:\Users\user\AppData\...\SetupWizard.exe, PE32+
27->96
dropped
38
SetupWizard.exe
27->38
started
file9
signatures10
process11
dnsIp12
116
C:\Users\user\AppData\...\_quoting_c.pyd, PE32+
29->116
dropped
118
C:\Users\user\AppData\...\vcruntime140.dll, PE32+
29->118
dropped
130
33 other files (32 malicious)
29->130
dropped
214
Multi AV Scanner detection
for dropped file
29->214
216
Machine Learning detection
for dropped file
29->216
218
Found many strings related
to Crypto-Wallets (likely
being stolen)
29->218
220
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
29->220
42
stub.exe
29->42
started
134
172.67.198.131
CLOUDFLARENETUS
United States
33->134
120
C:\Users\user\Desktop\SetupWizard.exe, PE32+
33->120
dropped
132
17 other malicious files
33->132
dropped
222
Contains functionality
to inject code into
remote processes
36->222
224
Writes to foreign memory
regions
36->224
226
Allocates memory in
foreign processes
36->226
228
Injects a PE file into
a foreign processes
36->228
47
RegAsm.exe
36->47
started
122
C:\Windows\system32\winsvc.exe (copy), PE32+
38->122
dropped
124
C:\Windows\system32\.co70C0.tmp (copy), PE32+
38->124
dropped
126
C:\Windows\System32\.co70C0.tmp, PE32+
38->126
dropped
136
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
40->136
138
31.31.198.35
AS-REGRU
Russian Federation
40->138
128
C:\Users\user\AppData\Local\Temp\12.exe, PE32
40->128
dropped
230
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
40->230
232
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
40->232
234
Tries to steal Crypto
Currency Wallets
40->234
49
RegAsm.exe
40->49
started
51
Conhost.exe
40->51
started
file13
signatures14
process15
dnsIp16
146
208.95.112.1
TUT-ASUS
United States
42->146
148
185.199.108.133
FASTLYUS
Netherlands
42->148
152
2 other IPs or domains
42->152
104
C:\Users\user\AppData\Local\...\Monster.exe, PE32+
42->104
dropped
106
C:\Users\user\AppData\...\system_info.txt, Algol
42->106
dropped
108
C:\Users\user\AppData\...\process_info.txt, ASCII
42->108
dropped
114
3 other malicious files
42->114
dropped
200
Tries to harvest and
steal browser information
(history, passwords,
etc)
42->200
202
Modifies the windows
firewall
42->202
204
Tries to steal communication
platform credentials
(via file / registry
access)
42->204
212
3 other signatures
42->212
53
cmd.exe
42->53
started
56
cmd.exe
42->56
started
58
cmd.exe
42->58
started
65
9 other processes
42->65
110
C:\Users\user\AppData\Roaming\...\svhoost.exe, PE32
47->110
dropped
112
C:\Users\user\AppData\Roaming\...\One.exe, PE32
47->112
dropped
206
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
47->206
208
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
47->208
60
svhoost.exe
47->60
started
63
One.exe
47->63
started
150
4.185.27.237
LEVEL3US
United States
49->150
210
Tries to steal Crypto
Currency Wallets
49->210
file17
signatures18
process19
dnsIp20
164
Uses netsh to modify
the Windows network
and firewall settings
53->164
166
Tries to harvest and
steal WLAN passwords
53->166
168
Uses attrib.exe to hide
files
53->168
67
conhost.exe
53->67
started
69
systeminfo.exe
56->69
started
72
net.exe
56->72
started
82
4 other processes
56->82
74
WMIC.exe
58->74
started
76
conhost.exe
58->76
started
154
185.172.128.33
NADYMSS-ASRU
Russian Federation
60->154
170
Installs new ROOT certificates
60->170
172
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
60->172
78
conhost.exe
63->78
started
80
powershell.exe
65->80
started
84
16 other processes
65->84
signatures21
process22
signatures23
174
Queries sensitive network
adapter information
(via WMI, Win32_NetworkAdapter,
often done to detect
virtual machines)
69->174
86
net1.exe
72->86
started
176
Queries sensitive service
information (via WMI,
Win32_LogicalDisk, often
done to detect sandboxes)
74->176
178
Installs new ROOT certificates
80->178
88
quser.exe
82->88
started
process24
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://77.91.77.82/soka/random.exe