General
-
Target
a.zip
-
Size
832B
-
Sample
230906-vrxr5aaa71
-
MD5
10e578867faad166dc6a8f3868cef2f4
-
SHA1
f541fab60d482834e90638c5aebdefe3d997174e
-
SHA256
6fe03f61ee89f37688356f14ee8dc2d0c001e0d43281fad29386270a9c71c92c
-
SHA512
38389b61e71eed9a9587900f60d59c145d070d0e02602f473c284befcd4898b1191f1982e71463c9cbe17ea36f4ec6c17d665f072e730981eae00fd805863114
Static task
static1
Behavioral task
behavioral1
Sample
a.zip
Resource
win10-20230831-en
Malware Config
Extracted
gh0strat
182.42.105.12
Extracted
amadey
3.88
45.9.74.5/b7djSDcPcZ/index.php
-
install_dir
0ac15cf625
-
install_file
yiueea.exe
-
strings_key
ff7b4cd5e3143e87f81788365929e6dd
Extracted
formbook
4.1
xy18
ecpgbtrj.cfd
flourishaudiodrama.com
bledcerium.online
fwdnrbnm.cfd
gbohsseo.cfd
bolam3rah85.site
barstool-us.com
angelaluxury.com
promoaverage.site
paragonpediatricurgentcare.com
florescerpsicologia.com
zeajux.cfd
fyxidltp.cfd
theprettynote.com
cygoodshopgogo.top
oconnellro.pro
mmcrecordsph.online
wbtverfrgw.cfd
xiaoseo171.top
horatiothemusical.com
djtescao.store
combustionketo028.com
gotothe.bar
lindenhursthfc.com
linenindia.com
lhivpgi.xyz
enzocanelli.com
iklo.info
tonder.info
creative-outs.com
compraconscienteonline.com
jerxier.online
lolabylhorie.com
onlinemarket.cloud
thinkfx.website
incontragay.com
spatialdatacapture.com
gqhuksjw.cfd
becker-bauelemente.com
mythflix.fun
pioneerelectrical.net
yogaclasses99.com
schnaitt.design
kvri.fun
j51xit.cfd
ktkequipment.com
kw6439.cfd
jc1134.com
drrnagrl.cfd
thutceem.cfd
consultoriaelectrica.com
samtroart.com
zigntwck.cfd
bageshwarimesh.com
winefy.shop
berugakdigital.site
unificcoops.com
wanlinmuye.com
jaweriaasif.com
qcekilps.cfd
maafarulodge.com
muaslbaf.cfd
mmbythmv.buzz
kupays.com
ex-sideproject.com
Extracted
remcos
Thcinc
b6079658.sytes.net:6110
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
thcinc.exe
-
copy_folder
Thcinc
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
thcinc
-
mouse_option
false
-
mutex
Rmc-X26LV5
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
nanocore
1.2.2.0
discojockeylight.duckdns.org:4444
11ab0fe1-4213-49d2-ae5d-4cc94b2030c0
-
activate_away_mode
true
-
backup_connection_host
discojockeylight.duckdns.org
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-06-17T07:56:57.343492536Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4444
-
default_group
discojockeylight
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
11ab0fe1-4213-49d2-ae5d-4cc94b2030c0
-
mutex_timeout
5000
-
prevent_system_sleep
false
- primary_connection_host
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
remcos
1.7 Pro
Merdeka
ascoitaliasasummer.duckdns.org:3030
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
Windows Session Start.exe
-
copy_folder
Microsoft Media Session
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
Windows Display
-
keylog_path
%WinDir%
-
mouse_option
false
-
mutex
Windows Audio
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
Windows Sound EndPoints
-
take_screenshot_option
true
-
take_screenshot_time
5
-
take_screenshot_title
Username;password;proforma;invoice;notepad
Extracted
agenttesla
https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/
Extracted
C:\webRef\How To Restore Your Files.txt
http://knightv5pdwrrfyxghivy3qccxxghk2yfyfigur562gcnmpmgd4pgfid.onion/a6b37125-b8e6-4d51-9476-607342037e0f/
https://www.binance.com/en/how-to-buy/bitcoin
Targets
-
-
Target
a.zip
-
Size
832B
-
MD5
10e578867faad166dc6a8f3868cef2f4
-
SHA1
f541fab60d482834e90638c5aebdefe3d997174e
-
SHA256
6fe03f61ee89f37688356f14ee8dc2d0c001e0d43281fad29386270a9c71c92c
-
SHA512
38389b61e71eed9a9587900f60d59c145d070d0e02602f473c284befcd4898b1191f1982e71463c9cbe17ea36f4ec6c17d665f072e730981eae00fd805863114
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Fabookie payload
-
Gh0st RAT payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Async RAT payload
-
Formbook payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1