General

  • Target

    DEnigma-Cracker.zip

  • Size

    57.2MB

  • Sample

    240724-2m76mavcjd

  • MD5

    51b30497ff40b9d4d0d9f05e48a07f1b

  • SHA1

    8cd5d75a929f9b4dd627ad513fd945ff60ca53cd

  • SHA256

    1169d42a18b94dc0e459bda8263bf68dc7eb5bd3032122f5bf3398a58b56968d

  • SHA512

    ed207d359188eaec52a108b9920438648105aae78eb2c37bb2e0bb0f85db269e99d8a7110e23ea965a32d1b179c80bc0cd4837a97d07e714515d73db8e7638ad

  • SSDEEP

    786432:vAAdOGJA1QEHbUos9PWWJOKJoNAfY0ds54qHLJ19JC0Cc7oiUyOWoSUeYlRk8skO:pdRsQfOwBOlH1dC0r7oi/OZc6VsgsJyk

Malware Config

Extracted

Family

nightingale

C2

https://api.telegram.org/bot6708185867:AAFutwCJHLGWBWo0L449U4iLunAo9h3rayQ/sendDocument

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6708185867:AAFutwCJHLGWBWo0L449U4iLunAo9h3rayQ/sendDocumen

Targets

    • Target

      DEnigma-Cracker/DEnigmaCraker V2.exe

    • Size

      59.3MB

    • MD5

      62fadebebf4208af245829dcb4b159b6

    • SHA1

      476d3854d2eaead161e85624f33fbd5a507ac885

    • SHA256

      1ae1b2e13a00415f208ca5972b2b6ff5fead584bb3aca4294505e46f56cc5c6c

    • SHA512

      b25b8b1a179e7b81ad6bfc13349c0ca3056be55156d838cc0f24625920f0dba4e02f513b71308ab49981b59d9f9c385086e4393b9b12fc4f2b134d98a414fb7f

    • SSDEEP

      1572864:2sabzB6M352iHBA8PCwl5qewZJpLfEFZPvLHwHMxwX:2s6zB6yBR4eopyFHRE

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Nightingale stealer

      Nightingale stealer is an information stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks