General
-
Target
RNSM00429.7z
-
Size
32.1MB
-
Sample
241026-qk6z1aslbq
-
MD5
dc347fe718685d9942c53bae8ccd3396
-
SHA1
5acdaf735b7f94bcf180ae4d442738015f28a211
-
SHA256
7f2b34572c0056ff9730a707bb27e228694dc15d9a099362a9e16a0ba7fee024
-
SHA512
cceb077dbfe473b86fc4ac3bba475f7f9f5f26ee8c05f046c6149349162c8f860c0de1f8dbb95df9239289360f704d3a5256d834fb6c502ba63e10009039530b
-
SSDEEP
786432:b9LihPYEqVEaw4qJZMt5JPIrV1nqj9SVi/BbqSvrV5jxfunqz:uY5EaGJO/JP0qj9SAZ+2bjx+8
Static task
static1
Malware Config
Extracted
darkcomet
Angel
detan155.3utilities.com:1537
DC_MUTEX-8CBS1T7
-
InstallPath
skype\Skype.exe
-
gencode
6M1G4dNEGvX2
-
install
true
-
offline_keylogger
true
-
password
viewsonic
-
persistence
true
-
reg_key
Skype
Extracted
orcus
xz
mehack1234567.ddns.net:8832
1aea3370b5824c3db9d5ee90510716f9
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%programfiles%\svchost\Yandex.exe
-
reconnect_delay
10000
-
registry_keyname
Yandex
-
taskscheduler_taskname
svchoster
-
watchdog_path
Temp\svchoster
Extracted
C:\Users\How To Restore Your Files.txt
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/104617a28c7b21518d506b079ca9d5221551f89d5d54025a1ec71dd33aacd896/
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/
http://vq3zf757tzpwhs7bulnr43d2rfg5fkvvfkhee2zhhzievuxrbnarmgqd.onion/4c43fb6f271eda10ac65ec0dc918f7ec851455acb98c1fe29f3b2feffe53c286
Extracted
C:\ProgramData\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.best
Extracted
metasploit
windows/single_exec
Extracted
orcus
wwwwwwwwwwwwwwwwwww.webhop.me:8353
5d87ffe5b7e9467491b5534273d3040f
-
autostart_method
Disable
-
enable_keylogger
true
-
install_path
%systemroot%\dllhost.exe
-
reconnect_delay
10000
-
registry_keyname
Microsoft Corporation
-
taskscheduler_taskname
Microsoft Corporation
-
watchdog_path
AppData\1
Extracted
C:\Program Files\Common Files\DESIGNER\!!FAQ for Decryption!!.txt
http://cuba4mp6ximo2zlo.onion/
Targets
-
-
Target
RNSM00429.7z
-
Size
32.1MB
-
MD5
dc347fe718685d9942c53bae8ccd3396
-
SHA1
5acdaf735b7f94bcf180ae4d442738015f28a211
-
SHA256
7f2b34572c0056ff9730a707bb27e228694dc15d9a099362a9e16a0ba7fee024
-
SHA512
cceb077dbfe473b86fc4ac3bba475f7f9f5f26ee8c05f046c6149349162c8f860c0de1f8dbb95df9239289360f704d3a5256d834fb6c502ba63e10009039530b
-
SSDEEP
786432:b9LihPYEqVEaw4qJZMt5JPIrV1nqj9SVi/BbqSvrV5jxfunqz:uY5EaGJO/JP0qj9SAZ+2bjx+8
-
Conti family
-
Darkcomet family
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Orcus family
-
Orcus main payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Orcurs Rat Executable
-
Creates new service(s)
-
Modifies Windows Firewall
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
1