General
-
Target
c839ec03c9b07879980d362ba4615df453d6e5847baf8fb89e1d0f2c5bafb2b8.hta
-
Size
25KB
-
Sample
241208-c77yxsykaz
-
MD5
03f88b6e5c92cf8865b13fb7495eac0a
-
SHA1
5f8a0e82674b25a9ef0f5d93f23075b1d7fb632b
-
SHA256
c839ec03c9b07879980d362ba4615df453d6e5847baf8fb89e1d0f2c5bafb2b8
-
SHA512
6d3baedcb209cbeb080c0a5bf31c33441f2c31f3fba77c95e7ff7c549db05871564fca22b30971e0e8465aa9822cb64a06ec7daa7911c7c9318ee4ebcd267d94
-
SSDEEP
192:b4sMlPX9+eCSEXxJckNfWMLAxdEW0UDqSbsCxLuoe23qNT2xZg6w0JGppinxDkdv:b4pX9+eCSEZLgi23q+gSIuq
Static task
static1
Behavioral task
behavioral1
Sample
c839ec03c9b07879980d362ba4615df453d6e5847baf8fb89e1d0f2c5bafb2b8.hta
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c839ec03c9b07879980d362ba4615df453d6e5847baf8fb89e1d0f2c5bafb2b8.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkvision
5.206.227.213
Targets
-
-
Target
c839ec03c9b07879980d362ba4615df453d6e5847baf8fb89e1d0f2c5bafb2b8.hta
-
Size
25KB
-
MD5
03f88b6e5c92cf8865b13fb7495eac0a
-
SHA1
5f8a0e82674b25a9ef0f5d93f23075b1d7fb632b
-
SHA256
c839ec03c9b07879980d362ba4615df453d6e5847baf8fb89e1d0f2c5bafb2b8
-
SHA512
6d3baedcb209cbeb080c0a5bf31c33441f2c31f3fba77c95e7ff7c549db05871564fca22b30971e0e8465aa9822cb64a06ec7daa7911c7c9318ee4ebcd267d94
-
SSDEEP
192:b4sMlPX9+eCSEXxJckNfWMLAxdEW0UDqSbsCxLuoe23qNT2xZg6w0JGppinxDkdv:b4pX9+eCSEZLgi23q+gSIuq
-
Darkvision family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1