General
-
Target
DEnigma-Cracker.zip
-
Size
57.2MB
-
Sample
240802-vnl68axcnh
-
MD5
51b30497ff40b9d4d0d9f05e48a07f1b
-
SHA1
8cd5d75a929f9b4dd627ad513fd945ff60ca53cd
-
SHA256
1169d42a18b94dc0e459bda8263bf68dc7eb5bd3032122f5bf3398a58b56968d
-
SHA512
ed207d359188eaec52a108b9920438648105aae78eb2c37bb2e0bb0f85db269e99d8a7110e23ea965a32d1b179c80bc0cd4837a97d07e714515d73db8e7638ad
-
SSDEEP
786432:vAAdOGJA1QEHbUos9PWWJOKJoNAfY0ds54qHLJ19JC0Cc7oiUyOWoSUeYlRk8skO:pdRsQfOwBOlH1dC0r7oi/OZc6VsgsJyk
Static task
static1
Behavioral task
behavioral1
Sample
DEnigma-Cracker/DEnigmaCraker V2.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
nightingale
https://api.telegram.org/bot6708185867:AAFutwCJHLGWBWo0L449U4iLunAo9h3rayQ/sendDocument
Extracted
gurcu
https://api.telegram.org/bot6708185867:AAFutwCJHLGWBWo0L449U4iLunAo9h3rayQ/sendDocumen
Targets
-
-
Target
DEnigma-Cracker/DEnigmaCraker V2.exe
-
Size
59.3MB
-
MD5
62fadebebf4208af245829dcb4b159b6
-
SHA1
476d3854d2eaead161e85624f33fbd5a507ac885
-
SHA256
1ae1b2e13a00415f208ca5972b2b6ff5fead584bb3aca4294505e46f56cc5c6c
-
SHA512
b25b8b1a179e7b81ad6bfc13349c0ca3056be55156d838cc0f24625920f0dba4e02f513b71308ab49981b59d9f9c385086e4393b9b12fc4f2b134d98a414fb7f
-
SSDEEP
1572864:2sabzB6M352iHBA8PCwl5qewZJpLfEFZPvLHwHMxwX:2s6zB6yBR4eopyFHRE
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3