General

  • Target

    29112024_1601_Rechnungens.zip

  • Size

    3KB

  • Sample

    241129-tgan6symgn

  • MD5

    81b1745ee32e396cfa36eed18b1b2927

  • SHA1

    953d7ad0f9d8036fd23f278d5381dd67091e7323

  • SHA256

    781f41c23b460a8b90f0bdb4b2cd0c6642bda3883f45464f016fd9c3b44dbb25

  • SHA512

    6f0fa3df23002fcc0f66ba3f6ebc2b6394af4ac293b2874176f122e855054f08ba9f4414e89b7cfe7abb368ffbb8ca9de2d89709e879d67126f3357a3e0e9b05

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://pub-fee23c54ae4b464fb3904eebeb70c629.r2.dev/upgrade.hta

Extracted

Family

darkvision

C2

5.206.227.213

Extracted

Language
hta
Source
URLs
hta.dropper

https://pub-fee23c54ae4b464fb3904eebeb70c629.r2.dev/upgrade.hta

Targets

    • Target

      Rechnung_2024_0092.pdf.lnk

    • Size

      3KB

    • MD5

      22c803dba48be47631f50a2bc486663d

    • SHA1

      62061211cc2ec3c8d655e0c3217e1e0febb2a4f8

    • SHA256

      7626763bffacecfaaad1880271b0ebc95b3bf961fc21a94e83341641d516adec

    • SHA512

      258635b1c0428a64ad28f0f3d30d24ead81a9e4413a962c49dc5804606931b26046ca048c1e22b4116d1b7f9148e5dcf9c9c6413c06221fce446601da4826709

    • DarkVision Rat

      DarkVision Rat is a trojan written in C++.

    • Darkvision family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Start PowerShell.

    • Suspicious use of SetThreadContext

    • Target

      Rechnung_2024_0093.pdf.lnk

    • Size

      3KB

    • MD5

      22c803dba48be47631f50a2bc486663d

    • SHA1

      62061211cc2ec3c8d655e0c3217e1e0febb2a4f8

    • SHA256

      7626763bffacecfaaad1880271b0ebc95b3bf961fc21a94e83341641d516adec

    • SHA512

      258635b1c0428a64ad28f0f3d30d24ead81a9e4413a962c49dc5804606931b26046ca048c1e22b4116d1b7f9148e5dcf9c9c6413c06221fce446601da4826709

    • DarkVision Rat

      DarkVision Rat is a trojan written in C++.

    • Darkvision family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

    • Target

      Rechnung_2024_0094.pdf.lnk

    • Size

      3KB

    • MD5

      22c803dba48be47631f50a2bc486663d

    • SHA1

      62061211cc2ec3c8d655e0c3217e1e0febb2a4f8

    • SHA256

      7626763bffacecfaaad1880271b0ebc95b3bf961fc21a94e83341641d516adec

    • SHA512

      258635b1c0428a64ad28f0f3d30d24ead81a9e4413a962c49dc5804606931b26046ca048c1e22b4116d1b7f9148e5dcf9c9c6413c06221fce446601da4826709

    • DarkVision Rat

      DarkVision Rat is a trojan written in C++.

    • Darkvision family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks