General
-
Target
CS SkinCHANGER.rar
-
Size
963KB
-
Sample
210520-zvacdvge2x
-
MD5
92992482ce924b4122ceb658336396a1
-
SHA1
2f2789e45c5152745feb69a36e18aec7ddecfdb4
-
SHA256
6284749beb1d6773e265524485d68268c9c90a385b82c229c16123f9839d087f
-
SHA512
f7c4a91d31f8c7f9ded1372bf81d9516b857effca66d224d026efcc25bc52cba7c628475441df013032fdba046f4f7c6cc608ced92af7a0c3c0422159097b962
Static task
static1
Behavioral task
behavioral1
Sample
CS SkinCHANGER.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
CS SkinCHANGER.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
Free Discord Nitro.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Free Discord Nitro.exe
Resource
win10v20210408
Malware Config
Extracted
Protocol: ftp- Host:
tasty-panel.ug - Port:
21 - Username:
user - Password:
IJNJINUJNI345457567234
Targets
-
-
Target
CS SkinCHANGER.exe
-
Size
1016KB
-
MD5
4baf19886d71c6d9312b3a71dcfea37e
-
SHA1
ebacfba77117ec07d108f1b80e419be9674a48da
-
SHA256
1d2005df287958967e785ebc022f183ed7b3878b631d75d61ed8d94bcda0ee58
-
SHA512
0bb4d418ca83f1f85edcfbea1cf3704d42ebb9e3092c70f0a982238210adc9b51cfa47f19df67f7f2714444f04ac4bbf27887724f1dbcd6d1ba84c872074067c
Score10/10-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-
-
-
Target
Free Discord Nitro.exe
-
Size
662KB
-
MD5
98d08b7942589fe9e468a91f048dcd3d
-
SHA1
af2950a505dd6e594f6f22305b939d5befafbe6f
-
SHA256
2d18c676d4c1bbfa2939d36e88d95ece52af4220f0579a15d68642906a42f3c2
-
SHA512
6672b5b900412a167d1d4e2bfaf4a2d901ed800cdb65f25645d498178839529dfb0de51610e59fb1de867a76fa8a82cdeb11ed4bfc55a4eefd356b510d62f4c5
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-