General
-
Target
x.exe
-
Size
11.6MB
-
Sample
241004-q6ms9a1grh
-
MD5
98733c220cfed98220e1e4b8dc2c7e64
-
SHA1
352eea59919452194cc76127583a9f9316fa96e2
-
SHA256
d489ae08f26a92bb6ee3d01a8cf6b2ea9f31e07b2388bfce2980a407ef4e86e6
-
SHA512
82fa1ccaec6cc39f654716d5dceac721dbc22e1fd42a0bc84fcc673123f028cebd255e9d36f237f81595c28ec8bb1a365577d62b347a5ac3d8b0cf84e4a84d20
-
SSDEEP
196608:Xouv86gV1rbQQOOl2szsHFUK2r7UyTAdQmR8dA6lf8Qnf2ODjMnGydScSEPVrBO8:9WV9hZ2YsHFUK2JAdQJl1F3MnG3tOVr5
Behavioral task
behavioral1
Sample
x.exe
Resource
win11-20240802-en
Malware Config
Extracted
stealc
default5_doz
http://62.204.41.159
-
url_path
/edd20096ecef326d.php
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Extracted
lumma
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
urelas
218.54.31.226
218.54.31.165
218.54.31.166
Extracted
C:\directory\CyberGate\RECOVERtntdt.txt
http://kkr4hbwdklf234bfl84uoqleflqwrfqwuelfh.brazabaya.com/3FF69FFB60987C90
http://974gfbjhb23hbfkyfaby3byqlyuebvly5q254y.mendilobo.com/3FF69FFB60987C90
http://a64gfdsjhb4htbiwaysbdvukyft5q.zobodine.at/3FF69FFB60987C90
http://k7tlx3ghr3m4n2tu.onion/3FF69FFB60987C90
Targets
-
-
Target
x.exe
-
Size
11.6MB
-
MD5
98733c220cfed98220e1e4b8dc2c7e64
-
SHA1
352eea59919452194cc76127583a9f9316fa96e2
-
SHA256
d489ae08f26a92bb6ee3d01a8cf6b2ea9f31e07b2388bfce2980a407ef4e86e6
-
SHA512
82fa1ccaec6cc39f654716d5dceac721dbc22e1fd42a0bc84fcc673123f028cebd255e9d36f237f81595c28ec8bb1a365577d62b347a5ac3d8b0cf84e4a84d20
-
SSDEEP
196608:Xouv86gV1rbQQOOl2szsHFUK2r7UyTAdQmR8dA6lf8Qnf2ODjMnGydScSEPVrBO8:9WV9hZ2YsHFUK2JAdQJl1F3MnG3tOVr5
-
Adds autorun key to be loaded by Explorer.exe on startup
-
Cobalt Strike reflective loader
Detects the reflective loader used by Cobalt Strike.
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Neshta payload
-
Detects MyDoom family
-
Gh0st RAT payload
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
XMRig Miner payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
4Hidden Files and Directories
4Impair Defenses
6Disable or Modify System Firewall
2Disable or Modify Tools
3Indicator Removal
3File Deletion
3Modify Registry
13Discovery
Peripheral Device Discovery
1Process Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1