Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 27, 2023, 10:18 a.m. | March 27, 2023, 10:25 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Save
2136-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Save
2288
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,
2220 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Main
1256-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cred64.dll,Main
2328
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
142.250.204.142 | Active | Moloch |
142.250.204.65 | Active | Moloch |
142.250.204.67 | Active | Moloch |
142.250.66.138 | Active | Moloch |
142.251.220.3 | Active | Moloch |
142.251.220.45 | Active | Moloch |
172.217.24.238 | Active | Moloch |
172.217.24.68 | Active | Moloch |
172.217.27.35 | Active | Moloch |
216.58.200.227 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Mktmp\Amadey\StealerDLL\x64\Release\STEALERDLL.pdb |
file | C:\Program Files\Mozilla Firefox\firefox.exe |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\firefox.exe |
section | _RDATA |
host | 142.250.204.142 | |||
host | 142.250.204.65 | |||
host | 142.250.204.67 | |||
host | 142.250.66.138 | |||
host | 142.251.220.3 | |||
host | 142.251.220.45 | |||
host | 172.217.24.238 | |||
host | 172.217.24.68 | |||
host | 172.217.27.35 | |||
host | 216.58.200.227 |
Bkav | W32.FlaVoredP.Trojan |
Lionic | Trojan.Win32.Stealer.12!c |
MicroWorld-eScan | Gen:Variant.Mikey.143765 |
FireEye | Gen:Variant.Mikey.143765 |
ALYac | Trojan.Agent.Amadey |
Malwarebytes | Spyware.PasswordStealer |
Sangfor | Infostealer.Win64.Agent.Vr39 |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | TrojanPSW:Win32/Amadey.0c7316ee |
K7GW | Password-Stealer ( 0059c99d1 ) |
K7AntiVirus | Password-Stealer ( 0059c99d1 ) |
Arcabit | Trojan.Mikey.D23195 |
VirIT | Trojan.Win64.Agent.BUQ |
Cyren | W64/Kryptik.ISH.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Amadey.G |
Cynet | Malicious (score: 100) |
Paloalto | generic.ml |
ClamAV | Win.Malware.Zusy-9985435-0 |
Kaspersky | Trojan-PSW.Win32.Stealer.azak |
BitDefender | Gen:Variant.Mikey.143765 |
NANO-Antivirus | Trojan.Win64.Stealer.juxsgz |
Avast | Win64:TrojanX-gen [Trj] |
Tencent | Win32.Trojan-QQPass.QQRob.Itgl |
Emsisoft | Gen:Variant.Mikey.143765 (B) |
DrWeb | Trojan.SpyBot.1180 |
VIPRE | Gen:Variant.Mikey.143765 |
TrendMicro | TROJ_GEN.R002C0DB623 |
McAfee-GW-Edition | BehavesLike.Win64.Dropper.th |
Sophos | Troj/Steal-DCI |
Avira | HEUR/AGEN.1301090 |
Antiy-AVL | Trojan[PSW]/Win32.Stealer |
Gridinsoft | Trojan.Win64.Agent.cl |
Microsoft | Trojan:Win64/Amadey.CA!MTB |
GData | Gen:Variant.Mikey.143765 |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R551446 |
McAfee | PWS-FDOE!3E762EF2E32A |
MAX | malware (ai score=83) |
VBA32 | TrojanPSW.Stealer |
TrendMicro-HouseCall | TROJ_GEN.R002C0DB623 |
Rising | Stealer.Agent!8.C2 (TFE:5:8Idbp2vqW9I) |
Yandex | Trojan.PWS.Agent!ZVaEsLSYcU0 |
Ikarus | Trojan-PSW.Agent |
MaxSecure | Trojan.Malware.1728101.susgen |
Fortinet | W64/Agent.CW!tr.pws |
AVG | Win64:TrojanX-gen [Trj] |
Panda | Trj/CI.A |