General
-
Target
d5b1e2cec0d590b3d6a8809c940b5316688ce0c8af9fbf8a42baf27888d971d5.exe
-
Size
160KB
-
Sample
240821-cwh6eszaqr
-
MD5
50acfb26d39aea301a42692d269b0577
-
SHA1
d92ece0badc23dc4562dbe6dbcd1c9f47812c6cb
-
SHA256
d5b1e2cec0d590b3d6a8809c940b5316688ce0c8af9fbf8a42baf27888d971d5
-
SHA512
d72c7410dfac81258ec79b03b53bda756c7b8a365ca6ac5e9578f105f69cad4911357395f5e088f9e6ddd48ff968809119556d349ea47b917168f7a3f5526430
-
SSDEEP
3072:+39emuxx5Ph+Nrlp5LoVpbDM5M5TM+jso:+3UtZe+LbDu+Q
Behavioral task
behavioral1
Sample
d5b1e2cec0d590b3d6a8809c940b5316688ce0c8af9fbf8a42baf27888d971d5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5b1e2cec0d590b3d6a8809c940b5316688ce0c8af9fbf8a42baf27888d971d5.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
nightingale
https://api.telegram.org/bot7360773915:AAGMf_A9lvN1HakLmVWWp2591SJduhueehE/sendDocument
Targets
-
-
Target
d5b1e2cec0d590b3d6a8809c940b5316688ce0c8af9fbf8a42baf27888d971d5.exe
-
Size
160KB
-
MD5
50acfb26d39aea301a42692d269b0577
-
SHA1
d92ece0badc23dc4562dbe6dbcd1c9f47812c6cb
-
SHA256
d5b1e2cec0d590b3d6a8809c940b5316688ce0c8af9fbf8a42baf27888d971d5
-
SHA512
d72c7410dfac81258ec79b03b53bda756c7b8a365ca6ac5e9578f105f69cad4911357395f5e088f9e6ddd48ff968809119556d349ea47b917168f7a3f5526430
-
SSDEEP
3072:+39emuxx5Ph+Nrlp5LoVpbDM5M5TM+jso:+3UtZe+LbDu+Q
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-