Overview
overview
10Static
static
10CATALOGO C...RL.exe
windows7-x64
10CATALOGO C...RL.exe
windows10-2004-x64
10IMG1067410252030.exe
windows7-x64
10IMG1067410252030.exe
windows10-2004-x64
10PO_#YBIC38...py.exe
windows7-x64
3PO_#YBIC38...py.exe
windows10-2004-x64
3PURCHASE ORDER.exe
windows7-x64
10PURCHASE ORDER.exe
windows10-2004-x64
7vxrlhg.exe
windows7-x64
3vxrlhg.exe
windows10-2004-x64
3PURCHASE O...E0.exe
windows7-x64
10PURCHASE O...E0.exe
windows10-2004-x64
7cucacm.exe
windows7-x64
3cucacm.exe
windows10-2004-x64
3General
-
Target
8d82945bd5782a593aa632fdb3fe3b651893e434545b8c22e4576b3a2a0248d8
-
Size
2.5MB
-
Sample
241121-yrs1qazrdm
-
MD5
b98cced0400a7424ba4f102b72be2989
-
SHA1
b8811c5bd4f7168667b51643e09aeb95ae1038c5
-
SHA256
8d82945bd5782a593aa632fdb3fe3b651893e434545b8c22e4576b3a2a0248d8
-
SHA512
78ae36787c0caea2e5e2d4092afd60b4cdd426e2e907e72443b7125243c3377fdba8b78c465184ca565e70a48ba440285e7edec0b1d61e82a76e349759c4671f
-
SSDEEP
49152:hDU90MDkxASNAgPh5hPReQFhZBWXAlTfL0CEuQObLOFq9dVs3ph6:7QkxASygPPe0Ww5LfEuZbZdVspQ
Behavioral task
behavioral1
Sample
CATALOGO CAMPIONI2022 IMAGINATON SRL.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
CATALOGO CAMPIONI2022 IMAGINATON SRL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IMG1067410252030.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
IMG1067410252030.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PO_#YBIC3892900183902328_Evaluated Copy.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PO_#YBIC3892900183902328_Evaluated Copy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
PURCHASE ORDER.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
vxrlhg.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
vxrlhg.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
PURCHASE ORDERSR1083004 Al Hitmi Fox Hills Residential MUE0.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
PURCHASE ORDERSR1083004 Al Hitmi Fox Hills Residential MUE0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cucacm.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
cucacm.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
purecrypter
http://13.231.238.12/dart/IMG1067410252030.png
Extracted
xloader
2.5
iepw
isabellechiritoiabogada.com
singaporeimpact.com
mdcxdgkr.com
fivestasrelectriccorp.com
apaspaa.com
datashen.com
yh2.space
remediationnews.com
randlesrice.com
mailclic.digital
n83a.com
wmeacc.com
cahuvoa.xyz
h0t-now.com
admtrans.com
yghdlhax.xyz
bakshipping.com
ambermariemusic.com
mandelbot.tech
cryptoassetmanager.xyz
navientrefinancing.com
xn--12c1cybcl4e.com
keysthatrock.com
shristiprintingplaces.com
bootychaserlinkedbingo.com
shebreaks.vegas
theadvocatingalmostattorney.com
mingyuan.men
bossila.store
mirceacuza.com
vcfnc.com
gamefi-giveaway.com
loveseaton.com
zcaerialdronecoverage.com
side-clicks.com
tavaresmelodia.com
edc10.com
moonfoxflow.club
sattaking-gaziabad.xyz
bharathjbaiju.com
drawapp.net
034655858.com
windrowysxqtn.xyz
upposeidonmax.net
phoebenfinn.com
getmusicheard.com
skyzed.com
worldcoachesnetwork.com
industrialrocketlamp.com
pontrenmutu.com
classiclord.com
cronamovement.com
carforsells.com
batuhanasut.com
obujieitel.quest
quimicosypapelesdelnte.com
szb6.com
handwerks-service.com
englishster.com
duncharis.com
dealsforsuvsil.com
heicensus.xyz
excellglobus.com
halkn.xyz
blue-chipwordtoscan-today.info
Extracted
warzonerat
hotboy01.ddns.net:4545
Targets
-
-
Target
CATALOGO CAMPIONI2022 IMAGINATON SRL.exe
-
Size
984KB
-
MD5
08c80c3ab9ea0ebebd24279ef82448d2
-
SHA1
cfe0664d25d7ac1d74e4ff3900ea2920d5db7a20
-
SHA256
57f0ec5d28d0ee7481e9a465f94bf79fa5d135e9b7d1d1e8b98b70442910c7a6
-
SHA512
e286c76b7eb72ab7b410a76114ed08cfc40681938d224378637970e4c46850d665528b8f4454265ff0120416049f4964ac8659783d36879da9103922b1fd20ca
-
SSDEEP
12288:ugWW4Tf590cGdmQvItAOSji1NXO2VbRSbJGY0yX9MMNTQ47hjPAWP1e/:uzhTx90cZCqAOv1NBVY0a9MwLhjP1P
-
Xloader family
-
Xloader payload
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of SetThreadContext
-
-
-
Target
IMG1067410252030.exe
-
Size
39KB
-
MD5
d27638db84894d3fa4935dbdbd5078ff
-
SHA1
c2b33647e8db1433e3e7767817e337772923aff2
-
SHA256
309c3ea985cf1b4438ded762e48ee09b3699ef020e0f28c76e5c63c34e02af66
-
SHA512
c642ef89f09cf8d22a506d9bd23f2c5fdc6e297f586127eae0e7572cc39942955815fb9c40ed53d145fa24fb670ddb78e2d118f29f1c51ef7259116d8bc740c6
-
SSDEEP
384:8lOcFdQqiz80LBDl3pf/+BWV9isZ0CM7vliFhXgobglDMcmn6f60wwwwwwwwwwwH:8IkDu9LBjf2BWVwsi7vAfwo/NQs
Score10/10-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
-
-
Target
PO_#YBIC3892900183902328_Evaluated Copy.exe
-
Size
665KB
-
MD5
197dd0edaa8b54d0d603e91784c69a40
-
SHA1
449a9453eac70fca50a13f372732971372259a53
-
SHA256
d8842d4c311c9e35f77ef0ee038f34061be70a55b38f949e0624d32e5a6a4212
-
SHA512
6a26fe5947945436aeb50222286fb87886b86ad7db4c447e664a64c673571383430ea1e2ea152f875518e30dc7e563c7aa30f76ef4f343275dcfb4674dea8f8f
-
SSDEEP
12288:wqPCYSx1alrmI6WvcmOEgJCegF63A5WfS2x3pxjsf:wqaVIiI6WvcykBzw5Wfd3/j4
Score3/10 -
-
-
Target
PURCHASE ORDER.exe
-
Size
551KB
-
MD5
0a1689698e15f2d5a7779a850b46217b
-
SHA1
7aeaced0fde2314490aa1c40025d4c10a60efcce
-
SHA256
789299ea329d9ab7fcb7043cf50dd4321ae3878c7f8eeb3136b5ed04ce2626e0
-
SHA512
4fb7c1317b8ea4a484ab8b8e5b84a2673734f75765af55dda6fd032be21f696a69816b15f13569dd3957897c874a55eeae01ddc09ee5a9f2839cc7e3c9354350
-
SSDEEP
12288:NP7r9r/+ppppppppppppppppppppppppppppp0YJwjyHyBK/LWCNyTrz9h74:N1MbTL/wvLU
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
vxrlhg.exe
-
Size
170KB
-
MD5
80fee08628f07e4a7b845cc50733dacc
-
SHA1
01293924c19486df0c778f367bd91570d2a8fe23
-
SHA256
1e636514dc1362a291840f1b2752c61c94914061296df098b176956681f14d77
-
SHA512
177df61cb33e7fb15b2e9226006871265ea729ca8a2f7ad6f36c6372f6d43171d05bc7821a5bc09e5e215f328414fb0f0e3ecaa0cd39ec5cd970f8515a93e5e7
-
SSDEEP
3072:SD1ox12eClvt/E2AVnqybemkYdUY6U+5aau0CcXqxbu:S41DClZQq2uYCpaTH
Score3/10 -
-
-
Target
PURCHASE ORDERSR1083004 Al Hitmi Fox Hills Residential MUE0.exe
-
Size
411KB
-
MD5
b34b6b21968f3ecf91d6c5e7a7aa67a0
-
SHA1
635ac67858b846b26569c3c86985f5f125cd11e4
-
SHA256
b17273d3677db30df59b70e0584a9e3f6644ef920a2fe6dfdc5518f840e09c06
-
SHA512
a20923c02ebf1bd432fe1307dd8dcebdf1f0d998a5d99d38b846089b425b3627c0cf7b754110a33f70ca8ee6015910cde3838b93fd5b0f8c4c7f515fd8f68b99
-
SSDEEP
6144:2xDZdVWwAOg5a34TcFyfEUK9vK3+f5Fhaa+IV60HbV1tAtYztD/:WdVYa34VfEUmv/hFYa56+VcCztr
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
cucacm.exe
-
Size
6KB
-
MD5
0bb7c6c0a98823d2add4de29846ef777
-
SHA1
b4d39b7a0faa45f1892ea4faa4c9fd57977d0fb6
-
SHA256
0db9ef4a094cc5597c748c3f83d35287000d1b2519ae092c85f9c5f4ec5cf42a
-
SHA512
e69d3df91eee94cb10a0ace66e29c3e66b39df9c8679ad485af5a825d8c052a6d49b6718c9a03920dcd9609b4c0f095542606fc400afe973e596402ba63a7d21
-
SSDEEP
96:5hQ5RrFbfZAPfgOJgH3DCOs6Edfq/VhB9oPOoynKx:rQ5PpHzPbE1wQPOoyn
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1