General
-
Target
a.exe
-
Size
5KB
-
Sample
230908-1tmmtsff28
-
MD5
fd3f7d8082b7cddb0e20ad1e8fd5d285
-
SHA1
ff51a1c5cab13afe0178163b2b9d60e49c799b74
-
SHA256
7ec0d3e3dc4222f34c482926ce1f971b51929e95b9d097140bc1f4b1c84dafd9
-
SHA512
166a2e743346bd5016b36278fb4bae0a96f86ce920ebae777baada95be887b679f5360de914c0563828dc2eadf2c091564c9f5cb05de32bd7f3b252a6f53deaa
-
SSDEEP
48:6AtGt28lK9iqmcfaFXfkeLJhyPFlWa8tYb/IL/cpwOulavTqXSfbNtm:RIUiqtaJkeqDUtfcpmsvNzNt
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win10-20230831-en
Malware Config
Extracted
http://80.66.79.27/o.png
Extracted
aurora
212.87.204.93:8081
Extracted
statusrecorder
185.106.94.73
Extracted
formbook
4.1
sy22
vinteligencia.com
displayfridges.fun
completetip.com
giallozafferrano.com
jizihao1.com
mysticheightstrail.com
fourseasonslb.com
kjnala.shop
mosiacwall.com
vandistreet.com
gracefullytouchedartistry.com
hbiwhwr.shop
mfmz.net
hrmbrillianz.com
funwarsztat.com
polewithcandy.com
ourrajasthan.com
wilhouettteamerica.com
johnnystintshop.com
asgnelwin.com
alcmcyu.com
thwmlohr.click
gypseascuba.com
mysonisgaythemovie.com
sunriseautostorellc.com
fuhouse.link
motorcycleglassesshop.com
vaskaworldairways.com
qixservice.online
b2b-scaling.com
03ss.vip
trishpintar.com
gk84.com
omclaval.com
emeeycarwash.com
wb7mnp.com
kimgj.com
278809.com
summitstracecolumbus.com
dryadai.com
vistcreative.com
weoliveorder.com
kwamitikki.com
cjk66.online
travisline.pro
mercardosupltda.shop
sunspotplumbing.com
podplugca.com
leontellez.com
fzturf.com
docomo-mobileconsulting.com
apneabirmingham.info
rollesgraciejiujitsu.com
sx15k.com
kebobcapital.com
91967.net
claudiaduverglas.com
zhperviepixie.com
oliwas.xyz
flowersinspace.tech
uadmxqby.click
greatbaitusa.com
drpenawaraircondhargarahmah.com
sofbks.top
sarthaksrishticreation.com
Targets
-
-
Target
a.exe
-
Size
5KB
-
MD5
fd3f7d8082b7cddb0e20ad1e8fd5d285
-
SHA1
ff51a1c5cab13afe0178163b2b9d60e49c799b74
-
SHA256
7ec0d3e3dc4222f34c482926ce1f971b51929e95b9d097140bc1f4b1c84dafd9
-
SHA512
166a2e743346bd5016b36278fb4bae0a96f86ce920ebae777baada95be887b679f5360de914c0563828dc2eadf2c091564c9f5cb05de32bd7f3b252a6f53deaa
-
SSDEEP
48:6AtGt28lK9iqmcfaFXfkeLJhyPFlWa8tYb/IL/cpwOulavTqXSfbNtm:RIUiqtaJkeqDUtfcpmsvNzNt
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Gurcu Stealer V3 payload
-
Detects Healer an antivirus disabler dropper
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Formbook payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Modifies file permissions
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1