General
-
Target
2a61021a45429291c995df6ddaa7ba17ad65a97d08831eacac5a70e80311495d
-
Size
18.5MB
-
Sample
240909-kq21casela
-
MD5
21711f826d40506b5adec528c15b3d9a
-
SHA1
30239c8e3a967740cbced5358b1100cda0b174c1
-
SHA256
2a61021a45429291c995df6ddaa7ba17ad65a97d08831eacac5a70e80311495d
-
SHA512
b6918878c4c7cf283814b356fd1806259f7acb234157088b85a37ed3814b2ba2875ba4bed19ac2041f7e9367b26f073a9fce447aed17d90ac18aefd45c0c643e
-
SSDEEP
393216:6svDmKR+o4MmWjsiVocJgCwtq+UIHuLXFSZudJdmHZ7vert8p1604+fp:VTUDvVuoc5UFUIODFKAdwkrM6Ofp
Static task
static1
Behavioral task
behavioral1
Sample
ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
great-it.gl.at.ply.gg:11149
4d5861675348411506f0e029827092c2
-
reg_key
4d5861675348411506f0e029827092c2
-
splitter
Y262SUCZ4UJJ
Extracted
njrat
im523
puked
147.185.221.20:47570
20006afb0ec33f2e48c8c1f17d4d3382
-
reg_key
20006afb0ec33f2e48c8c1f17d4d3382
-
splitter
|'|'|
Extracted
njrat
0.7d
чучундра
hakim32.ddns.net:2000
safety-bronze.gl.at.ply.gg:4444
27b92504703b09d3ee2dae0873e8e3f3
-
reg_key
27b92504703b09d3ee2dae0873e8e3f3
-
splitter
|'|'|
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7293375371:AAFwIvNWcuknS3y3mtsx4yNSSTkj8NCF_ko/sendMessage?chat_id=5795480469
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
remcos
AUGUST CRYPTER TOOLZ GRACE STUB
teamfavour222.ddns.net :6767
odogwuvisual123.duckdns.org:6767
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
-YFLE4M
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
C:\$Recycle.Bin\AXPZE-DECRYPT.txt
http://gandcrabmfe6mnef.onion/86804269ddcc129
Extracted
F:\$RECYCLE.BIN\S-1-5-21-523280732-2327480845-3730041215-1000\NLEQYYLXLH-DECRYPT.txt
http://gandcrabmfe6mnef.onion/bf7a6e3e6c0547de
Extracted
xloader
2.6
eido
revellbb.com
tempranillowine.net
viralstrategies.info
blacktxu.com
flfththirdbank.com
vaoex.com
theselfdirectedinvestor.com
vinadelmar.travel
othersidejimmythemonkey.com
jaguar-landrovercenter-graz.com
supremeosterreich.com
chatsubs.com
free99.design
serviciosmvs.com
bongmecams.xyz
malikwoodson.com
onlinegamebox.club
694624.com
yeezyzapatos.club
istanbul-hairtransplant.com
expectations.info
giveafeast.com
latcsvg.com
thetablelanta.com
digitalcoastdaily.com
talltailsentertainment.com
gastore.store
sextoys411.com
hhty307.com
gjiijsijfsdff.xyz
discord-dnd.com
myazpensioneducation.com
housetraitors.com
halopinkstar.com
thethord.com
brandx.biz
mrgear.xyz
emuk.site
ydbaba.com
wosongla.com
paligeri.com
clipcoffee.net
pathnorthsweeps.com
urlbnarc.com
grimpeople.online
surgetech.digital
uppercase-shop.com
anniebirdsong.info
cherylalopes.com
bravesxx.com
buysalba.com
aoneclubs.com
wank152.com
viv.gifts
n1groupe.com
zhengyp.top
boreable.xyz
pointlomaadvisors.com
thebestineasttexas.com
we-gamble.net
snowycitron.online
octsqd.xyz
226coaching.com
phuclapgarment.com
veterancg.com
Targets
-
-
Target
ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833.exe
-
Size
24.5MB
-
MD5
a5ca2d3b20cf191139a47d7261916d9e
-
SHA1
5d56e08cc55731f96db03911dba96dcdf22bcac8
-
SHA256
ab6b0c8a2fd898517ff036b9fc94ce581febdab5a69433f491fb70bc55ee1833
-
SHA512
e008b76d8040ef039424e6f7eec37b866fc7ab71d1cb11d839b4d4449758b3b8174249c353d1726ed736cb9c854cafda7648aee7a12c93d8a8e0cd0013a0c3ad
-
SSDEEP
49152:qnUSstktA/zuJuuS6FDlUhBKds9he3qUtM9l58uRgG+vTD7o9qa910rUo29xqcUt:ql
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
StormKitty payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Renames multiple (293) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Xloader payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Scripting
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
4Scripting
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Verclsid
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1