General
-
Target
9b3a50dc10eb0e67144d29b43b6be6ef932b4d3486659e5c699e72a82b063dd9
-
Size
4.1MB
-
Sample
230202-17s2rsbf6s
-
MD5
0a36af6655f76fdd5dc78ebbf85e2752
-
SHA1
79ad61776ec50945c1ab27bf434a8c0632003a1e
-
SHA256
9b3a50dc10eb0e67144d29b43b6be6ef932b4d3486659e5c699e72a82b063dd9
-
SHA512
a3f3924c00a241aaa60c598013c8338f7c20f2fa0e43feaa30f9a2b94480279b3b9c698dc3adffa5b3953cd07f0798d618c28891b499d1f473fc47b5f47f63f8
-
SSDEEP
49152:Q0vYGL/PdGnWYzlXaDSvcDNPZSUO59aukb57R2v2brVZM18s2916dBK7SkBYHMqr:Pvb/PW3lWI4pjy9aTR42b7iA5aMuxk
Static task
static1
Behavioral task
behavioral1
Sample
9b3a50dc10eb0e67144d29b43b6be6ef932b4d3486659e5c699e72a82b063dd9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b3a50dc10eb0e67144d29b43b6be6ef932b4d3486659e5c699e72a82b063dd9.exe
Resource
win10-20220812-en
Malware Config
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Targets
-
-
Target
9b3a50dc10eb0e67144d29b43b6be6ef932b4d3486659e5c699e72a82b063dd9
-
Size
4.1MB
-
MD5
0a36af6655f76fdd5dc78ebbf85e2752
-
SHA1
79ad61776ec50945c1ab27bf434a8c0632003a1e
-
SHA256
9b3a50dc10eb0e67144d29b43b6be6ef932b4d3486659e5c699e72a82b063dd9
-
SHA512
a3f3924c00a241aaa60c598013c8338f7c20f2fa0e43feaa30f9a2b94480279b3b9c698dc3adffa5b3953cd07f0798d618c28891b499d1f473fc47b5f47f63f8
-
SSDEEP
49152:Q0vYGL/PdGnWYzlXaDSvcDNPZSUO59aukb57R2v2brVZM18s2916dBK7SkBYHMqr:Pvb/PW3lWI4pjy9aTR42b7iA5aMuxk
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload
-
Detects Smokeloader packer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-