General
-
Target
a89d739e39a746fa53b4ace09ccc5ed7a4cd8bd522034aa953ec2892d374124d.bin
-
Size
207KB
-
Sample
220617-w991vafeb7
-
MD5
04abca366cc648a461c1eee9a883bd12
-
SHA1
889beaf9e13cfdc0d103c232c9a68c3febdbafaf
-
SHA256
a89d739e39a746fa53b4ace09ccc5ed7a4cd8bd522034aa953ec2892d374124d
-
SHA512
59ceed9b7cd95578200f7ffd749ff60e468784d29aee4f51510cda48089b068d999bfea7cbc2232d44c4746329bf5ecea9ae4225476e314b70f8f63388408b3e
Static task
static1
Behavioral task
behavioral1
Sample
a89d739e39a746fa53b4ace09ccc5ed7a4cd8bd522034aa953ec2892d374124d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a89d739e39a746fa53b4ace09ccc5ed7a4cd8bd522034aa953ec2892d374124d.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
privateloader
http://212.193.30.45/proxies.txt
http://212.193.30.29/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
212.193.30.21
http://45.144.225.57/server.txt
85.202.169.116
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://vipsofts.xyz/files/mega.bmp
Extracted
nymaim
37.0.8.39
31.210.20.149
212.192.241.16
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/eurfrsa613/
Targets
-
-
Target
a89d739e39a746fa53b4ace09ccc5ed7a4cd8bd522034aa953ec2892d374124d.bin
-
Size
207KB
-
MD5
04abca366cc648a461c1eee9a883bd12
-
SHA1
889beaf9e13cfdc0d103c232c9a68c3febdbafaf
-
SHA256
a89d739e39a746fa53b4ace09ccc5ed7a4cd8bd522034aa953ec2892d374124d
-
SHA512
59ceed9b7cd95578200f7ffd749ff60e468784d29aee4f51510cda48089b068d999bfea7cbc2232d44c4746329bf5ecea9ae4225476e314b70f8f63388408b3e
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies security service
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Socelars Payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
XMRig Miner Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
3Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File and Directory Permissions Modification
1Impair Defenses
1Install Root Certificate
1Modify Registry
6Web Service
1