Threat name:
Amadey, Cryptbot, Go Injector, PureLog S
Alert
Classification:
rans.troj.spyw.evad
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
High number of junk calls founds (likely related to sandbox DOS / API hammering)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Search for Antivirus process
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Amadeys stealer DLL
Yara detected Go Injector
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Vidar stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1494496
Sample:
file.exe
Startdate:
18/08/2024
Architecture:
WINDOWS
Score:
100
132
fivexc5vs.top
2->132
134
HJhaTjOPrjURhc.HJhaTjOPrjURhc
2->134
136
2 other IPs or domains
2->136
150
Multi AV Scanner detection
for domain / URL
2->150
152
Suricata IDS alerts
for network traffic
2->152
154
Found malware configuration
2->154
156
31 other signatures
2->156
11
axplong.exe
40
2->11
started
16
file.exe
5
2->16
started
18
axplong.exe
2->18
started
20
3 other processes
2->20
signatures3
process4
dnsIp5
146
185.215.113.16, 49737, 49738, 49740
WHOLESALECONNECTIONSNL
Portugal
11->146
148
154.216.17.4, 49741, 49746, 49749
SKHT-ASShenzhenKatherineHengTechnologyInformationCo
Seychelles
11->148
120
C:\Users\user\AppData\...\mobiletrans.exe, PE32+
11->120
dropped
122
C:\Users\user\AppData\Local\...\runtime.exe, PE32
11->122
dropped
124
C:\Users\user\AppData\...\BattleGermany.exe, PE32
11->124
dropped
130
15 other malicious files
11->130
dropped
210
Hides threads from debuggers
11->210
212
Tries to detect sandboxes
/ dynamic malware analysis
system (registry check)
11->212
214
Tries to detect process
monitoring tools (Task
Manager, Process Explorer
etc.)
11->214
22
BattleGermany.exe
11->22
started
26
stealc_default.exe
11->26
started
29
GOLD.exe
1
11->29
started
33
5 other processes
11->33
126
C:\Users\user\AppData\Local\...\axplong.exe, PE32
16->126
dropped
128
C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII
16->128
dropped
216
Detected unpacking (changes
PE section rights)
16->216
218
Tries to evade debugger
and weak emulator (self
modifying code)
16->218
220
Tries to detect virtualization
through RDTSC time measurements
16->220
31
axplong.exe
16->31
started
222
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
20->222
file6
signatures7
process8
dnsIp9
102
C:\Users\user\AppData\Local\Temp\Tracked, data
22->102
dropped
114
7 other malicious files
22->114
dropped
184
Multi AV Scanner detection
for dropped file
22->184
186
Writes many files with
high entropy
22->186
35
cmd.exe
22->35
started
140
185.215.113.17, 49747, 80
WHOLESALECONNECTIONSNL
Portugal
26->140
104
C:\Users\user\AppData\...\softokn3[1].dll, PE32
26->104
dropped
106
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
26->106
dropped
108
C:\Users\user\AppData\...\mozglue[1].dll, PE32
26->108
dropped
116
9 other files (5 malicious)
26->116
dropped
188
Tries to steal Mail
credentials (via file
/ registry access)
26->188
190
Found many strings related
to Crypto-Wallets (likely
being stolen)
26->190
204
4 other signatures
26->204
192
Machine Learning detection
for dropped file
29->192
206
4 other signatures
29->206
39
RegAsm.exe
6
24
29->39
started
194
Detected unpacking (changes
PE section rights)
31->194
196
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
31->196
208
6 other signatures
31->208
142
185.215.113.67
WHOLESALECONNECTIONSNL
Portugal
33->142
144
fivexc5vs.top
185.244.181.38
BELCLOUDBG
Russian Federation
33->144
110
C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32
33->110
dropped
112
C:\Users\user\AppData\Local\Temp\Zinc, data
33->112
dropped
118
7 other malicious files
33->118
dropped
198
Antivirus detection
for dropped file
33->198
200
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
33->200
202
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
33->202
42
RegAsm.exe
33->42
started
44
Hkbsse.exe
33->44
started
46
cmd.exe
33->46
started
48
3 other processes
33->48
file10
signatures11
process12
dnsIp13
92
C:\Users\user\AppData\Local\...\Community.pif, PE32
35->92
dropped
170
Drops PE files with
a suspicious file extension
35->170
172
Writes many files with
high entropy
35->172
50
Community.pif
35->50
started
54
cmd.exe
35->54
started
56
conhost.exe
35->56
started
68
7 other processes
35->68
138
95.179.163.21, 29257, 49739
AS-CHOOPAUS
Netherlands
39->138
94
C:\Users\user\AppData\...\RegAsm.exe.log, ASCII
39->94
dropped
174
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->174
176
Installs new ROOT certificates
39->176
178
Found many strings related
to Crypto-Wallets (likely
being stolen)
39->178
182
2 other signatures
39->182
96
C:\Users\user\AppData\...\pkw4tAc8PX.exe, PE32
42->96
dropped
98
C:\Users\user\AppData\...\KJcu2Qr60r.exe, PE32
42->98
dropped
58
KJcu2Qr60r.exe
42->58
started
60
pkw4tAc8PX.exe
42->60
started
180
Multi AV Scanner detection
for dropped file
44->180
100
C:\Users\user\AppData\Local\...\Beijing.pif, PE32
46->100
dropped
62
conhost.exe
46->62
started
64
tasklist.exe
46->64
started
66
findstr.exe
46->66
started
file14
signatures15
process16
file17
84
C:\Users\user\AppData\Local\...\SkyPilot.pif, PE32
50->84
dropped
86
C:\Users\user\AppData\Local\...\SkyPilot.js, ASCII
50->86
dropped
88
C:\Users\user\AppData\Local\...\D, data
50->88
dropped
158
Drops PE files with
a suspicious file extension
50->158
160
Uses schtasks.exe or
at.exe to add and modify
task schedules
50->160
162
Writes to foreign memory
regions
50->162
168
2 other signatures
50->168
70
cmd.exe
50->70
started
72
schtasks.exe
50->72
started
90
C:\Users\user\AppData\Local\Temp\177479\s, data
54->90
dropped
164
Multi AV Scanner detection
for dropped file
58->164
166
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
58->166
74
conhost.exe
58->74
started
76
conhost.exe
60->76
started
signatures18
process19
process20
78
conhost.exe
70->78
started
80
schtasks.exe
70->80
started
82
conhost.exe
72->82
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.