General
-
Target
Testing (5).zip
-
Size
6.0MB
-
Sample
241124-b7xbratpan
-
MD5
4361601ad4e2af850ccf0e600509c2ca
-
SHA1
9a2112227673788b6570384a2eb1f32537f46a30
-
SHA256
2c41808826974a0fdd3c7b27850143cad077a79e0cf69c011da495d6abee679a
-
SHA512
74e884d5cd117b6d5898f9c2b3ccd424b46a9bd958e2412987fdba00496318547a1b1f625de6b5195c8150ce81ef58e8c015875ccc00b222ffda1d5e0f830eab
-
SSDEEP
98304:VYhsAjqphjdMXv8Xg1qdPNGv4mLI833edIVEXYxssdOTyc4Fh+LhwgLUpjbk387K:qsAW7jakwUGv6E3edIqB2c4FIhwg6/yd
Behavioral task
behavioral1
Sample
Testing (5).zip
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMwOTg3NTA0MzA1MTg5Njk1NA.GTR-3U.C7tazMXoRaSR--tVDMbQdoDKBw2f8bLXItZIRo
-
server_id
1309876526615101530
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
761
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Extracted
amadey
5.04
4bee07
http://185.215.113.209
-
install_dir
fc9e0aaab7
-
install_file
defnur.exe
-
strings_key
191655f008adc880f91bfc85bc56db54
-
url_paths
/Fru7Nk9/index.php
Targets
-
-
Target
Testing (5).zip
-
Size
6.0MB
-
MD5
4361601ad4e2af850ccf0e600509c2ca
-
SHA1
9a2112227673788b6570384a2eb1f32537f46a30
-
SHA256
2c41808826974a0fdd3c7b27850143cad077a79e0cf69c011da495d6abee679a
-
SHA512
74e884d5cd117b6d5898f9c2b3ccd424b46a9bd958e2412987fdba00496318547a1b1f625de6b5195c8150ce81ef58e8c015875ccc00b222ffda1d5e0f830eab
-
SSDEEP
98304:VYhsAjqphjdMXv8Xg1qdPNGv4mLI833edIVEXYxssdOTyc4Fh+LhwgLUpjbk387K:qsAW7jakwUGv6E3edIqB2c4FIhwg6/yd
-
Amadey family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Discordrat family
-
Meduza Stealer payload
-
Meduza family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Renames multiple (2879) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2