General
-
Target
lvVysTc.zip
-
Size
8.6MB
-
Sample
241130-z17qxavqfz
-
MD5
d001b3303da444021e26c1f67d52b433
-
SHA1
6236627fde1667659bbb784fc31249b754e41109
-
SHA256
55076d193e58d93e5004fd85c807f7a7ba284e028ffcc2b757769162b4a2bc54
-
SHA512
6a840b729fd007a11b1cba9731fafb47d694ecc7571d6444c7541283113fda2d6d761a5d244948f1cfc581ca4f93970814368fa5786ec0904138523b0c873cf5
-
SSDEEP
196608:XBkLDwH4bLsCBWEHtq40Z9g9iXHWspX2mwSklMEAIzp+vBQ0w5t:Xo04VBWgtH0Z9g9e2YT9klXo20w/
Behavioral task
behavioral1
Sample
lvVysTc/Randazor/Razandor.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lvVysTc/Randazor/Razandor.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lvVysTc/Randazor/dangert.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
lvVysTc/Randazor/dangert.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
lvVysTc/Randazor/Razandor.dll
-
Size
958KB
-
MD5
922e65fd502fedf855422f9343fb88fa
-
SHA1
12803d54a1c91ba25bae7d924016e0dce667ab15
-
SHA256
6a1afc9c98761fcd93f1f8878b673af549f3bbe97d6ae3ecb23a080462a41d54
-
SHA512
b4cb9f19eec8e2d159733f39580e762a7ef74f2e962618d7b8b969bb84e294867890a20c503feea53dc451eb9cd03d41e35c2d5825c16bf730ba4c2081e0a8c2
-
SSDEEP
12288:2GhQW0to+40OXmwuFyEd/LJgxUZ8ipQsxja67rno+X24KkT0M01/:2GooRpXmhyEWUZ8iQEjv7kj4KkT0
Score1/10 -
-
-
Target
lvVysTc/Randazor/dangert.exe
-
Size
8.3MB
-
MD5
c70193efe79e15dd2c5d7fcb8e4b5574
-
SHA1
cf5a97f0cddd3e896d9b7ef3847d28c6c2a16b90
-
SHA256
87dbcf083b04e3fd2cd119ab98e8e724671b5add5f726246571e8a4444666212
-
SHA512
30b98905aa96b7d9c30e43beb80472518c617007b3117697d192aba1f257885fbe47ae111772cf77da9cb7ea7afa410701fcd854c994cee8149de2d277ddf3e2
-
SSDEEP
196608:Q2uYQwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jv:lIHziK1piXLGVE4UrS0VJr
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3