General
-
Target
brhu.zip
-
Size
5.2MB
-
Sample
241203-yv6e8axkfk
-
MD5
b4beead5a110d9ce24b1c26fa41e3e99
-
SHA1
b2e873487c4d90447d923b3b6b89995ffb456b8c
-
SHA256
a1356c9f60766482ea7590a16225a6a13497387345741da43d7cd5f33ab47576
-
SHA512
8f701a85322980c28f0742ff6b4ba549eef93c0462cfc27d56517d1d210c4016ebbe5ef064fa5346c65119dadb2916de04e5be4f689f4c2f68a949f2e9bd617b
-
SSDEEP
98304:taptf7h03fmRwldsRLvP43G9B7JgnZX0XRBx9dLCHi3mKJ2cWTju:tGf7jko4olEZX0L7dL2i37ncu
Malware Config
Extracted
darkcomet
Guest16
darkgvr.duckdns.org:1604
picaroon.duckdns.org:1604
DC_MUTEX-1F8AXR1
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MuPduYiF2XAq
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
Zula Hack
denkmisin.duckdns.org:5552
Windows Service
-
reg_key
Windows Service
-
splitter
|Hassan|
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
3.17.202.129:17362
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
brhu.zip
-
Size
5.2MB
-
MD5
b4beead5a110d9ce24b1c26fa41e3e99
-
SHA1
b2e873487c4d90447d923b3b6b89995ffb456b8c
-
SHA256
a1356c9f60766482ea7590a16225a6a13497387345741da43d7cd5f33ab47576
-
SHA512
8f701a85322980c28f0742ff6b4ba549eef93c0462cfc27d56517d1d210c4016ebbe5ef064fa5346c65119dadb2916de04e5be4f689f4c2f68a949f2e9bd617b
-
SSDEEP
98304:taptf7h03fmRwldsRLvP43G9B7JgnZX0XRBx9dLCHi3mKJ2cWTju:tGf7jko4olEZX0L7dL2i37ncu
-
Darkcomet family
-
Detect XenoRat Payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies WinLogon for persistence
-
Njrat family
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1