General
-
Target
DAnegds_LetThereBeCarnage.exe
-
Size
176KB
-
Sample
241108-z73qjayrdx
-
MD5
9be0ce1fee8d843a42b1dcb1ae8a3eaa
-
SHA1
8ba99f4d945c297a78c11eaebf3e25a13155192e
-
SHA256
88b40bff36c532652d1c4da16fafe23d4dd0460618c54a489a6418281dbb0646
-
SHA512
b2d362eceaf9dedf3296cc2582c5442414925490a36c51dc277d8c14a9a9cc10578dd88f74dd1afcc79da2377b6bc75a20c21c08491dc22f16f03546643863c3
-
SSDEEP
3072:GlTFUnEvu9PnL/MvAFtOwQ9bwVjfyqyq5Q8hSbJX2UlD1fz6:SEUAFtOwQ9b0jfyqyqi8hSbJXZ1m
Behavioral task
behavioral1
Sample
DAnegds_LetThereBeCarnage.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DAnegds_LetThereBeCarnage.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
DAnegds_LetThereBeCarnage.exe
-
Size
176KB
-
MD5
9be0ce1fee8d843a42b1dcb1ae8a3eaa
-
SHA1
8ba99f4d945c297a78c11eaebf3e25a13155192e
-
SHA256
88b40bff36c532652d1c4da16fafe23d4dd0460618c54a489a6418281dbb0646
-
SHA512
b2d362eceaf9dedf3296cc2582c5442414925490a36c51dc277d8c14a9a9cc10578dd88f74dd1afcc79da2377b6bc75a20c21c08491dc22f16f03546643863c3
-
SSDEEP
3072:GlTFUnEvu9PnL/MvAFtOwQ9bwVjfyqyq5Q8hSbJX2UlD1fz6:SEUAFtOwQ9b0jfyqyqi8hSbJXZ1m
-
Asyncrat family
-
Nightingale family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1