Resubmissions
09-05-2024 18:25
240509-w2nsmsbc56 1009-05-2024 08:53
240509-ks9szahf2w 1009-05-2024 08:52
240509-ks3pnace25 108-05-2024 09:27
240508-le3m6sdf7t 1007-05-2024 10:53
240507-my8tzach4v 505-05-2024 15:20
240505-sqqlbadg5s 504-05-2024 12:20
240504-phv92sgf24 1004-05-2024 12:17
240504-pf52gage49 1003-05-2024 11:11
240503-naq5pafb29 1030-04-2024 17:26
240430-v1anysbf4y 7General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
vidar
9.2
90055089a554b801602b3ac265dc570c
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
profile_id_v2
90055089a554b801602b3ac265dc570c
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Targets
-
-
Target
https://github.com
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Vidar Stealer
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Nirsoft
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-