General

  • Target

    DEnigmaCraker V2.exe

  • Size

    59.3MB

  • Sample

    240802-rfaaxasbjc

  • MD5

    62fadebebf4208af245829dcb4b159b6

  • SHA1

    476d3854d2eaead161e85624f33fbd5a507ac885

  • SHA256

    1ae1b2e13a00415f208ca5972b2b6ff5fead584bb3aca4294505e46f56cc5c6c

  • SHA512

    b25b8b1a179e7b81ad6bfc13349c0ca3056be55156d838cc0f24625920f0dba4e02f513b71308ab49981b59d9f9c385086e4393b9b12fc4f2b134d98a414fb7f

  • SSDEEP

    1572864:2sabzB6M352iHBA8PCwl5qewZJpLfEFZPvLHwHMxwX:2s6zB6yBR4eopyFHRE

Malware Config

Extracted

Family

nightingale

C2

https://api.telegram.org/bot6708185867:AAFutwCJHLGWBWo0L449U4iLunAo9h3rayQ/sendDocument

Targets

    • Target

      DEnigmaCraker V2.exe

    • Size

      59.3MB

    • MD5

      62fadebebf4208af245829dcb4b159b6

    • SHA1

      476d3854d2eaead161e85624f33fbd5a507ac885

    • SHA256

      1ae1b2e13a00415f208ca5972b2b6ff5fead584bb3aca4294505e46f56cc5c6c

    • SHA512

      b25b8b1a179e7b81ad6bfc13349c0ca3056be55156d838cc0f24625920f0dba4e02f513b71308ab49981b59d9f9c385086e4393b9b12fc4f2b134d98a414fb7f

    • SSDEEP

      1572864:2sabzB6M352iHBA8PCwl5qewZJpLfEFZPvLHwHMxwX:2s6zB6yBR4eopyFHRE

    • Nightingale stealer

      Nightingale stealer is an information stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks