Overview
overview
10Static
static
1Embarking_...ial.js
windows7-x64
3Embarking_...ial.js
windows10-2004-x64
10Navigating...ial.js
windows7-x64
3Navigating...ial.js
windows10-2004-x64
10Redefining...ial.js
windows7-x64
3Redefining...ial.js
windows10-2004-x64
10Role_Direc...ial.js
windows7-x64
3Role_Direc...ial.js
windows10-2004-x64
10Transition...ial.js
windows7-x64
3Transition...ial.js
windows10-2004-x64
10General
-
Target
NEAS.d2dcaec93d82105a85aa59a8c4bc3fb68cd84eefd9bac9caec917a6554ef63fezip_JC.zip
-
Size
254KB
-
Sample
231019-ybw3face72
-
MD5
5d04f41fc9f1b6c802f6927e2fa12882
-
SHA1
d015e659770dce7cf6587856fc108c7d67fd8536
-
SHA256
d2dcaec93d82105a85aa59a8c4bc3fb68cd84eefd9bac9caec917a6554ef63fe
-
SHA512
98d28190f6e0f1764e290b6f49d270be80049ea8253d717987cfc3b5c42d89c21fa70124e976ccc62daca4cf6414a125fd2ad663cd4885eb57b3bffc3accb4bc
-
SSDEEP
1536:6AIMFFdYMxAcEQDFXiAIMFFdYMxAcEQDHAIMFFdYMxAcEQD7AIMFFdYMxAcEQDtp:6EY8BFXiEY8BHEY8B7EY8BREY8BM
Static task
static1
Behavioral task
behavioral1
Sample
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Navigating_Our_Evolution_October_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Navigating_Our_Evolution_October_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Redefining_Our_Structural_Canvas_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Redefining_Our_Structural_Canvas_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Role_Directives_Effective_2023_Confidential.js
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Role_Directives_Effective_2023_Confidential.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Transition_Journey_2023_Confidential.js
Resource
win7-20230831-en
Malware Config
Extracted
darkgate
Ricoc3
http://hgfdytrywq.com
-
alternative_c2_port
8080
-
anti_analysis
false
-
anti_debug
false
-
anti_vm
false
-
c2_port
80
-
check_disk
false
-
check_ram
false
-
check_xeon
false
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
uwCQCDKnhIZhrE
-
internal_mutex
txtMut
-
minimum_disk
100
-
minimum_ram
4096
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
Ricoc3
Targets
-
-
Target
Embarking_on_Our_Renewed_Mission_and_Values_2023_Confidential.js
-
Size
49KB
-
MD5
c19568c51692a5b4dbfc29c02fafcf8d
-
SHA1
b265c4f15c591a241d19c7284efeeb1e73407df0
-
SHA256
c8c425368b40c30a09a8e4990e53a1df4c29493ad138287493da0d6f56f1dade
-
SHA512
329efccd2808ffd1ee7c6e741890aad2ee22705bd0c2703a11f054e6d29520964c39edfb039cf3834c0e23990994b95748edb74944fdfad1d8c78e5adc9b4dbc
-
SSDEEP
768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3Dxt7niEL:nAIMFFdYMxAcEQDFXL
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
-
-
Target
Navigating_Our_Evolution_October_2023_Confidential.js
-
Size
50KB
-
MD5
e65b29d3b1c48e5ca3d77588e6375382
-
SHA1
ef407527c8228d8a1b7bc1ec5c1c4000464498ad
-
SHA256
1706dccb08d8fa1a4e38ae118a4137c0ab4bb6b906eef24693a422a30b465e2d
-
SHA512
d2fb401af2cf8a4d5c152dfceead38b0693103e100dafa060f6bde0a3241aa3061892bede91bb71255cd608c4200f93131e2fbdb58895620a3bf1591ddfb87e2
-
SSDEEP
768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3Cj0yFUK:nAIMFFdYMxAcEQDg
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
-
-
Target
Redefining_Our_Structural_Canvas_2023_Confidential.js
-
Size
50KB
-
MD5
6e0b712bbd5e1a3ee9eb2098cadf0a90
-
SHA1
53697a5a284e0584181e3c3d4303cded6e58f2f2
-
SHA256
ac61469d96805f9590d80397ed8fca735b718c000026ff5d99672c791d4707b7
-
SHA512
55d1197aba1a398719a0d33c16ed25f757f4f6d4ea11a3870ebbd96ae3530e1064e3885f0ad8cbfd540829e989abc9ac463d5ed36044af4db5ee1b3fce8a41d9
-
SSDEEP
768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3WSLbsX6:nAIMFFdYMxAcEQDn
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
-
-
Target
Role_Directives_Effective_2023_Confidential.js
-
Size
51KB
-
MD5
98a065c330d0e987786793a243f7f53e
-
SHA1
277fc8a50892980c5523d1e1706d706d64e76624
-
SHA256
54464835989986ae3804a570f5e3b299db8cb2a19a47d6444b1d410ad51586ee
-
SHA512
ea07611e517669fc9dc3987d57598ccc33487035b1d22a346e40a6c06fcb8f38d1dd1f821bff8a478730ba73913ab518ad41301d13b61aee36fbe680e9943c23
-
SSDEEP
768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3PywbIp9:nAIMFFdYMxAcEQDtk9
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
-
-
Target
Transition_Journey_2023_Confidential.js
-
Size
50KB
-
MD5
83914282d9c9680c567121cc18dac066
-
SHA1
f80092da919ee472ac673c96da20d28c96a30b27
-
SHA256
412a2790effdc2b85bb83bdf1106fe2f2471df8dfd81df07084ba31371aa8887
-
SHA512
0f8429f3a2a3c1d972d657c39bd5092395d9b108fbf08ead143daac720a637019222e0a61ed9fba35a9fc2f155c5b060d23ff77cadc31041eb2c5017a24f272b
-
SSDEEP
768:pBA7PMMFA0tdlXKNSR4vlGRep2lcwJeL+C2jQdc7YCORUQuFBt3TWpe5q:nAIMFFdYMxAcEQDK
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-