Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • submitted
    20-06-2024 01:07

General

  • Target

    de9738bd66cf075e2de53f21c2bcc5b79709c68e7899e9ce3c045ff485e8d499.exe

Score
10/10

Malware Config

Extracted

Family

nightingale

C2

80.76.49.148:3999

https://api.telegram.org/bot6813766312:AAGyxmK0E-SiPNsQCpjEIFZJIOhZnrPLxhw/sendMessage?chat_id=6467170572

Signatures

  • Nightingale family
  • Nightingale stealer

    Nightingale stealer is an information stealer written in C#.

  • Modifies registry class 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de9738bd66cf075e2de53f21c2bcc5b79709c68e7899e9ce3c045ff485e8d499.exe
    "C:\Users\Admin\AppData\Local\Temp\de9738bd66cf075e2de53f21c2bcc5b79709c68e7899e9ce3c045ff485e8d499.exe"
    1⤵
    • Modifies registry class
    PID:1736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-0-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

    Filesize

    4KB

  • memory/1736-1-0x00000000012A0000-0x00000000012CA000-memory.dmp

    Filesize

    168KB

  • memory/1736-2-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB

  • memory/1736-3-0x000007FEF5D03000-0x000007FEF5D04000-memory.dmp

    Filesize

    4KB

  • memory/1736-4-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

    Filesize

    9.9MB