General
-
Target
6dfd3f8435cb9fda6843ea12c5e83f0d.exe
-
Size
5.5MB
-
Sample
241105-kbraasxkex
-
MD5
6dfd3f8435cb9fda6843ea12c5e83f0d
-
SHA1
d2473d2dccb03b38c1e8fa4ecd14242ecf03ed55
-
SHA256
69321782fa34fd498bdeec1689406544090465f528a2f3529326c85c612e444f
-
SHA512
9bc87a4d632db2dc387b92dbd6184ee6ee70a6b517cf9bb95c948bf45b9955042313d59a4f2b59e8ca84130de500dda1a7230a10616fe931613db1f69bcea819
-
SSDEEP
98304:O7fD4kHhAkoh8AnGK6Z0XUkUbfqS50szfHt+6FTujVR/cANZ2dHtKOHVTA13ePeO:GD4oYnlXrUGS5xrtfIUAmdHtKgS1oJ
Static task
static1
Behavioral task
behavioral1
Sample
6dfd3f8435cb9fda6843ea12c5e83f0d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
127.0.0.1:8895
162.230.48.189:8895
ZRGtN7NDh24Vx89x
-
install_file
USB.exe
Extracted
lumma
https://founpiuer.store/api
Targets
-
-
Target
6dfd3f8435cb9fda6843ea12c5e83f0d.exe
-
Size
5.5MB
-
MD5
6dfd3f8435cb9fda6843ea12c5e83f0d
-
SHA1
d2473d2dccb03b38c1e8fa4ecd14242ecf03ed55
-
SHA256
69321782fa34fd498bdeec1689406544090465f528a2f3529326c85c612e444f
-
SHA512
9bc87a4d632db2dc387b92dbd6184ee6ee70a6b517cf9bb95c948bf45b9955042313d59a4f2b59e8ca84130de500dda1a7230a10616fe931613db1f69bcea819
-
SSDEEP
98304:O7fD4kHhAkoh8AnGK6Z0XUkUbfqS50szfHt+6FTujVR/cANZ2dHtKOHVTA13ePeO:GD4oYnlXrUGS5xrtfIUAmdHtKgS1oJ
-
Amadey family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Lumma family
-
Stealc family
-
StormKitty payload
-
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Adds Run key to start application
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Indicator Removal
1Clear Windows Event Logs
1Modify Registry
3Virtualization/Sandbox Evasion
2