General
-
Target
Crack.exe
-
Size
880KB
-
Sample
230325-swzq6sdc77
-
MD5
e299ac0fd27e67160225400bdd27366f
-
SHA1
65011c91a7fbae82f4a6f3c81ff396b96f84359c
-
SHA256
cb2758f0f595a4fd22411088590a3bb671834342e73b86c4ef9d863d28eec8ed
-
SHA512
f4f4e4554b4391b50977948dbc7c1eb2c837fdb2f321665e406af90dba9ba4b2c4a851406ca13cb321c363602f24b963633c5153329f5e292f4a076e2cb98b46
-
SSDEEP
6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7F71d43wUmDm:nz/9ja2ieFYp5R+I7BY
Static task
static1
Behavioral task
behavioral1
Sample
Crack.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Crack.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
Crack.exe
-
Size
880KB
-
MD5
e299ac0fd27e67160225400bdd27366f
-
SHA1
65011c91a7fbae82f4a6f3c81ff396b96f84359c
-
SHA256
cb2758f0f595a4fd22411088590a3bb671834342e73b86c4ef9d863d28eec8ed
-
SHA512
f4f4e4554b4391b50977948dbc7c1eb2c837fdb2f321665e406af90dba9ba4b2c4a851406ca13cb321c363602f24b963633c5153329f5e292f4a076e2cb98b46
-
SSDEEP
6144:LQuiA1RTz/cYja2ieb5YbF5R+Jn8xH97r7F71d43wUmDm:nz/9ja2ieFYp5R+I7BY
Score10/10-
Detects PseudoManuscrypt payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
PseudoManuscrypt
PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-