Threat name:
Amadey, Cryptbot, Neoreklami, PureLog St
Alert
Classification:
rans.phis.troj.adwa.spyw.expl.evad
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Drops script or batch files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
High number of junk calls founds (likely related to sandbox DOS / API hammering)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites Mozilla Firefox settings
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected Generic Downloader
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1490824
Sample:
file.exe
Startdate:
09/08/2024
Architecture:
WINDOWS
Score:
100
184
Found malware configuration
2->184
186
Malicious sample detected
(through community Yara
rule)
2->186
188
Antivirus detection
for URL or domain
2->188
190
22 other signatures
2->190
14
axplong.exe
31
2->14
started
19
file.exe
5
2->19
started
21
axplong.exe
2->21
started
23
Hkbsse.exe
2->23
started
process3
dnsIp4
158
185.196.11.123
SIMPLECARRIERCH
Switzerland
14->158
160
185.215.113.16
WHOLESALECONNECTIONSNL
Portugal
14->160
162
2 other IPs or domains
14->162
126
C:\Users\user\AppData\...\umrfile%20.exe, PE32+
14->126
dropped
128
C:\Users\user\AppData\...\stealc_default.exe, PE32
14->128
dropped
130
C:\Users\user\AppData\Local\...\06082025.exe, PE32
14->130
dropped
136
9 other malicious files
14->136
dropped
170
Hides threads from debuggers
14->170
172
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
14->172
174
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
14->174
25
umrfile%20.exe
14->25
started
28
GOLD.exe
1
14->28
started
30
stealc_default.exe
14->30
started
36
3 other processes
14->36
132
C:\Users\user\AppData\Local\...\axplong.exe, PE32
19->132
dropped
134
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
19->134
dropped
176
Detected unpacking (changes
PE section rights)
19->176
178
Tries to evade debugger
and weak emulator (self
modifying code)
19->178
180
Tries to detect virtualization
through RDTSC time measurements
19->180
34
axplong.exe
19->34
started
182
Multi AV Scanner detection
for dropped file
23->182
file5
signatures6
process7
dnsIp8
212
Multi AV Scanner detection
for dropped file
25->212
232
3 other signatures
25->232
38
RegAsm.exe
25->38
started
57
3 other processes
25->57
214
Contains functionality
to inject code into
remote processes
28->214
216
Injects a PE file into
a foreign processes
28->216
43
RegAsm.exe
28->43
started
45
RegAsm.exe
5
4
28->45
started
47
conhost.exe
28->47
started
164
185.215.113.17
WHOLESALECONNECTIONSNL
Portugal
30->164
138
C:\Users\user\AppData\...\softokn3[1].dll, PE32
30->138
dropped
140
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
30->140
dropped
142
C:\Users\user\AppData\...\mozglue[1].dll, PE32
30->142
dropped
146
9 other files (1 malicious)
30->146
dropped
218
Tries to steal Mail
credentials (via file
/ registry access)
30->218
220
Found many strings related
to Crypto-Wallets (likely
being stolen)
30->220
234
3 other signatures
30->234
222
Detected unpacking (changes
PE section rights)
34->222
224
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
34->224
236
5 other signatures
34->236
166
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
36->166
168
185.166.143.48
AMAZON-02US
Germany
36->168
144
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
36->144
dropped
226
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
36->226
228
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
36->228
230
Tries to harvest and
steal browser information
(history, passwords,
etc)
36->230
49
RegAsm.exe
36->49
started
51
conhost.exe
36->51
started
53
RegAsm.exe
36->53
started
55
Hkbsse.exe
36->55
started
file9
signatures10
process11
dnsIp12
150
140.82.121.3
GITHUBUS
United States
38->150
152
147.45.60.44
FREE-NET-ASFREEnetEU
Russian Federation
38->152
156
5 other IPs or domains
38->156
102
C:\Users\...\zv3YaNVeZLPpYY6954vLkw00.exe, PE32
38->102
dropped
104
C:\Users\...\za2N2WlNIUv3OfZcyeIdvjeD.exe, PE32
38->104
dropped
106
C:\Users\...\x2lA3rv9oTM4kVkytUxxZJfj.exe, PE32
38->106
dropped
112
228 other malicious files
38->112
dropped
196
Overwrites Mozilla Firefox
settings
38->196
59
qlsltGnFQul3fohUt6kP9mh0.exe
38->59
started
63
Af8LIFNmI77qobIHHhxH62hQ.exe
38->63
started
65
V7bzSTv4XorvDJjHi9lrecTp.exe
38->65
started
72
6 other processes
38->72
198
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
43->198
200
Drops script or batch
files to the startup
folder
43->200
202
Creates HTML files with
.exe extension (expired
dropper behavior)
43->202
208
2 other signatures
43->208
154
20.52.165.210
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
45->154
204
Tries to steal Crypto
Currency Wallets
45->204
108
C:\Users\user\AppData\...\rgMLJR5O89.exe, PE32
49->108
dropped
110
C:\Users\user\AppData\...\mYdZBaZLKG.exe, PE32
49->110
dropped
206
Found many strings related
to Crypto-Wallets (likely
being stolen)
49->206
68
mYdZBaZLKG.exe
49->68
started
70
rgMLJR5O89.exe
49->70
started
file13
signatures14
process15
dnsIp16
118
C:\Users\user\AppData\Local\...\Install.exe, PE32
59->118
dropped
120
C:\Users\user\AppData\Local\...\config.txt, data
59->120
dropped
238
Writes many files with
high entropy
59->238
74
Install.exe
59->74
started
122
C:\Users\user\AppData\Local\...\Install.exe, PE32
63->122
dropped
124
C:\Users\user\AppData\Local\...\config.txt, data
63->124
dropped
77
Install.exe
63->77
started
148
87.228.16.38
INF-NET-ASRU
Russian Federation
65->148
240
Tries to harvest and
steal browser information
(history, passwords,
etc)
65->240
242
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
68->242
79
conhost.exe
68->79
started
81
conhost.exe
70->81
started
file17
signatures18
process19
file20
114
C:\Users\user\AppData\Local\...\Install.exe, PE32
74->114
dropped
83
Install.exe
74->83
started
116
C:\Users\user\AppData\Local\...\Install.exe, PE32
77->116
dropped
86
Install.exe
77->86
started
process21
signatures22
192
Multi AV Scanner detection
for dropped file
83->192
194
Modifies Windows Defender
protection settings
83->194
88
cmd.exe
83->88
started
91
cmd.exe
86->91
started
process23
signatures24
210
Modifies Windows Defender
protection settings
88->210
93
forfiles.exe
88->93
started
96
conhost.exe
88->96
started
process25
signatures26
244
Modifies Windows Defender
protection settings
93->244
98
cmd.exe
93->98
started
process27
process28
100
reg.exe
98->100
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.