Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10477abe4b25...51.exe
windows7-x64
10477abe4b25...51.exe
windows10-2004-x64
1047c6de91e1...b0.exe
windows7-x64
1047c6de91e1...b0.exe
windows10-2004-x64
1047ce70cdef...aa.exe
windows7-x64
1047ce70cdef...aa.exe
windows10-2004-x64
74809a98c25...ee.exe
windows7-x64
14809a98c25...ee.exe
windows10-2004-x64
10480bfd19cc...7e.exe
windows7-x64
10480bfd19cc...7e.exe
windows10-2004-x64
104818942b62...ae.exe
windows7-x64
104818942b62...ae.exe
windows10-2004-x64
10485ef3e4d3...15.exe
windows7-x64
10485ef3e4d3...15.exe
windows10-2004-x64
10486a44dd40...61.exe
windows7-x64
10486a44dd40...61.exe
windows10-2004-x64
10487afaa242...b4.exe
windows7-x64
3487afaa242...b4.exe
windows10-2004-x64
3488aec85d4...b2.exe
windows7-x64
8488aec85d4...b2.exe
windows10-2004-x64
848dd84f7a2...da.exe
windows7-x64
1048dd84f7a2...da.exe
windows10-2004-x64
104931b13a12...db.exe
windows7-x64
104931b13a12...db.exe
windows10-2004-x64
104963d3411f...95.exe
windows7-x64
34963d3411f...95.exe
windows10-2004-x64
34981b96b4a...e4.exe
windows7-x64
34981b96b4a...e4.exe
windows10-2004-x64
34996155e60...cb.exe
windows7-x64
104996155e60...cb.exe
windows10-2004-x64
1049986bd925...30.exe
windows7-x64
1049986bd925...30.exe
windows10-2004-x64
10General
-
Target
archive_18.zip
-
Size
44.5MB
-
Sample
250322-gw843ayzet
-
MD5
d70c1a243cdb511386ff95f285cec502
-
SHA1
64446e9130cfa7dececa2687cb09eb2d044a76f9
-
SHA256
f4111d30be32600233ad61440ff2f9a6484f3ba6c04fae4b522fc09ab0de3831
-
SHA512
aa84bf7f5cac7bae1f1202677dfa0503e70249472b0069426543e453e7bd06a439f186e14758bc1b45b557a9386f31bc99142c7ad4c5fa7cbf8bc4567a415ebd
-
SSDEEP
786432:g0tv7iZAp/TSyhy3e3jQ//yxNY6u9EwyTXp/ucV5wPauEs//yxNHtzEKFq:g0tvuZAp/tO6Eag9PE/ucV5wdPaZgKs
Behavioral task
behavioral1
Sample
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
47ce70cdeffbe184e4414b64b813fcaa.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
47ce70cdeffbe184e4414b64b813fcaa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
4809a98c25f0a7be709206691dd2a0ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4809a98c25f0a7be709206691dd2a0ee.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
480bfd19cce007d5891ad838d903b17e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
480bfd19cce007d5891ad838d903b17e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
485ef3e4d31b39e6107f797859f14415.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
485ef3e4d31b39e6107f797859f14415.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
486a44dd40852eb23aeca8e8951ffa61.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
486a44dd40852eb23aeca8e8951ffa61.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
487afaa2421384f1449a96637df558b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
487afaa2421384f1449a96637df558b4.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral19
Sample
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
4981b96b4a936aa6e960d3d9604a63e4.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
4981b96b4a936aa6e960d3d9604a63e4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
4996155e60aac91174cee14de1120fcb.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
4996155e60aac91174cee14de1120fcb.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
49986bd925df8b3a09e58c4999927830.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
49986bd925df8b3a09e58c4999927830.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
denvy1-64284.portmap.host:64284:4782
5e5cf16c381d2c6f9bd898a2b029e870
-
reg_key
5e5cf16c381d2c6f9bd898a2b029e870
-
splitter
Y262SUCZ4UJJ
Extracted
xworm
127.0.0.1:8848
expected-sega.gl.at.ply.gg:4730
chat-poster.gl.at.ply.gg:41534
193.161.193.99:21764
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Extracted
nanocore
1.2.2.0
91.236.116.142:5888
d995ed82-bf13-4043-b564-f5f89f8c5209
-
activate_away_mode
true
-
backup_connection_host
91.236.116.142
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2017-01-07T03:01:54.729778636Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5888
-
default_group
Spy
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
d995ed82-bf13-4043-b564-f5f89f8c5209
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
91.236.116.142
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
xworm
5.0
on-donors.gl.at.ply.gg:5500
Ii4gIkCPmmFUXemC
-
install_file
USB.exe
Targets
-
-
Target
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351.exe
-
Size
606KB
-
MD5
ec244cbabaaa60802ed76d8964a79cb3
-
SHA1
56419b721068e70b2b69520017f94606927fe595
-
SHA256
477abe4b25790663f42286884bad1f54fccac4fd3c881cf1c7d7ad8d7bab3351
-
SHA512
734e394c523493d9f5524eae3b6f9b20f5d291ea6052cce7de12c34c5b3833c7dc7377974480517f2eab5c962050a7f7a8a911a228e47f2aefb0fb3fa7d168f4
-
SSDEEP
6144:TtT/Yq3v9Auky+4dusAIFB++velibxPyp/64wjOjn6cB3ri57:16u7+487IFjvelQypyfy7i57
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0.exe
-
Size
1.0MB
-
MD5
83e74c5c8c4c1d174a055af1e0182393
-
SHA1
1bdfc6b9d7a9abdaaa08e701cb6ef5fbc90e9594
-
SHA256
47c6de91e1706234f4587aa8f42a8c76d818b3055dc457b6dda51b803bf09ab0
-
SHA512
d798465d7ab67d0cd656277fad5bddbbc8de2d739dfbd5da669c1494fbddcb9518f36a92c6a27c741ec703de85d902d06197f1120f8b49e8e38d72e285ead665
-
SSDEEP
12288:h11qi7aQZVQDHV1SY9LjHvxmthnjlc1qrNhx5yRfeisk:lq1QZVQDHrSY9LWnpNrcRf
-
Detect Xworm Payload
-
Xworm family
-
Suspicious use of SetThreadContext
-
-
-
Target
47ce70cdeffbe184e4414b64b813fcaa.exe
-
Size
25.8MB
-
MD5
47ce70cdeffbe184e4414b64b813fcaa
-
SHA1
6daf2be501fb8ed05a8a5e8e5a351223c3a61c3e
-
SHA256
9097502ebdd5bb6c3f61d78148211feda2f25682be1ecd2f331c37c4a36cb501
-
SHA512
4f40036c816452794ad841fcb2deb1a5baf5bc584415f138b608f5f211a6088f7db2b6fb2a9e7e583457c314ea7d566f359c5dd0d779a89eb355a5df3877aa54
-
SSDEEP
393216:tSOWHAhJbjQno/A8w5y3COZfJrBIhUcT0FES0gjVhJ:t8D8w5GBkS0gPJ
Score10/10-
Modifies visiblity of hidden/system files in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
4809a98c25f0a7be709206691dd2a0ee.exe
-
Size
54KB
-
MD5
4809a98c25f0a7be709206691dd2a0ee
-
SHA1
83d5c6c56b101dbbff6c7e6a9abdc77270e460a1
-
SHA256
92d6bd28467aeb15829e676d32c09f5981baf3845ebaf7f69da9741c372b1cda
-
SHA512
85147c8b32df54d542f9e510226f8874f1aa5bc03e4bdc9a195a156fd92630a7ee10b15c18068244817ed5251a5bcbe5c8b52368753a389fcda7af1deacac75b
-
SSDEEP
1536:FOpwLVcvsG+yiZodvTlhJX3eye5IybOCoDGbfY:F4wLyvky6opTTt33MSN6rY
-
Modifies Windows Defender Real-time Protection settings
-
Modifies Windows Defender notification settings
-
Modifies firewall policy service
-
Modifies security service
-
UAC bypass
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Identifies Xen via ACPI registry values (likely anti-VM)
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Checks whether UAC is enabled
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
-
-
Target
480bfd19cce007d5891ad838d903b17e.exe
-
Size
1.1MB
-
MD5
480bfd19cce007d5891ad838d903b17e
-
SHA1
f99f0df5cc724c83b37f90a47da43a2424153bc8
-
SHA256
01411f77f35029b6c9f9d8726f561fdae8031d6a288c9dae9e070cd9136eab25
-
SHA512
d83e62b20bc0b1fdb7219527f3352e346200c77a45ef47849a4762d3f47cdacc4c1463f1da3f85e4bbb4e45ba3d7a77f0dbb9cab96a2361cc4c1fdf54a2c7df8
-
SSDEEP
12288:t6NE5eSwJu37+GXJpkaI7ShG54v4ahgVY3whNG8/LI6i4ejmtnbAouuFteLBdBN9:t6NReJXJIwvJgVQSoPEzKkLXa
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Adds Run key to start application
-
-
-
Target
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae.exe
-
Size
3.7MB
-
MD5
9fca2a5278edc3a95d546f0ae7f3cbff
-
SHA1
c97159bcbf621e7b9374472ed53a4dd963f75cf7
-
SHA256
4818942b6268d474373eadf8aa175f0de0315fc406eafa97d7fa7db7c154e9ae
-
SHA512
447deeb5021f15c46ca4eb70cc46065d3bd041afde860dfa2a7b9a7fbd9c4640712ad4c221f220015d28251780e124ea0bc9a548f97e822946eafffe8169f211
-
SSDEEP
98304:AkSzpYRKKe/I765KN6fXVwfbC6gz5IfMTJInd:GPKeC65U69wfxUTa
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
485ef3e4d31b39e6107f797859f14415.exe
-
Size
5.9MB
-
MD5
485ef3e4d31b39e6107f797859f14415
-
SHA1
3739bada3227bce92e083531766d21aa4c11159a
-
SHA256
b37b01540833889b41c27875378edb8fefebb2b56423c57a3a003bb1a71e501b
-
SHA512
d5708f1610ec1748d1866edf380b5bd34f2bced3b100654d0d8cd25651565a6ac3d92777b8959a36290a9020649570e7a64d44d6afd6d33cc6df0dee1a408145
-
SSDEEP
98304:hyeUxPQ0JMLyWIvqrhH05I8TderKjHDFUh9HkEXJfw4t:hyeU11Rvqmu8TWKnF6N/1wY
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
486a44dd40852eb23aeca8e8951ffa61.exe
-
Size
54KB
-
MD5
486a44dd40852eb23aeca8e8951ffa61
-
SHA1
6fb6f73727522c1b67cf7db5853bd12e84226753
-
SHA256
ce834e57992c0f4579135e3313b176f2493712eaa6b5fd96aecd972b297d4c92
-
SHA512
d37587fc39fdf91a180f9b8b3cfdda6e804e28e82630428ca73205f70641a84e700a8f3558a928b31f59ad25d77364322e7fd5c0a37814fa21b8bcca66d6d6d4
-
SSDEEP
768:VyJZuIZ2Eslt0g5Xy3N3+dJSNXxWQG35bmaePD5PvPtXXJdxIEpmBg:Vyr1Gt0g5+NaGhWQcGDfX3xIEpmBg
-
Njrat family
-
Stops running service(s)
-
Drops startup file
-
Adds Run key to start application
-
-
-
Target
487afaa2421384f1449a96637df558b4.exe
-
Size
15KB
-
MD5
487afaa2421384f1449a96637df558b4
-
SHA1
87f9edc71b13f5bb1b87e0369e531ee6d17aff4d
-
SHA256
b6fd976bea3755f5b73802548928b389789584076b9d5a3e5d42642792707cdd
-
SHA512
905765c455b15e2221e92cb42abb075aac1bb8add344f4e8a4d9334361239d741077918f9d04f21effbb3c72f19124521bc097170099d6a31b802c523b2b6985
-
SSDEEP
384:o7y8xJoeC71aRZtKBl9vOVUkgha4H94jWjel0:oek65URZWnvOVJ4H9XA0
Score3/10 -
-
-
Target
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2.exe
-
Size
3.4MB
-
MD5
e44ce2c03e5af2bc482fea32685d3fca
-
SHA1
c87647db90bb759d7109cd47515fa4921397f1fb
-
SHA256
488aec85d490754bc445f0e21e7d4d5146c71d500bd953b8108608d44e0351b2
-
SHA512
764f8fb037f1a529bb54ef2cde8ee91e3afe23c2ed93e8a3796082840cc3524f2c581bd2a22cab9beca975c9442bb7729024b28e0cab7adaf58471f1a736d09e
-
SSDEEP
98304:TRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/HW:Tkj8NBFwxpNOuk2b
Score8/10-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da.exe
-
Size
3.3MB
-
MD5
74da02657baeecb247413687ca835103
-
SHA1
44f3e5bdc60e9d41d624a1de2154d804a53aa8be
-
SHA256
48dd84f7a2cbfb0a068fa1a74c35fa4983f355dd026648bde3c594d0afe696da
-
SHA512
c679fa77c3b8a83e6c8607d77f2ff575ce9903fe8836e850cf12b5c8756f6123411c413e79bc131a1723d6803785c33f24612a4bcedbbb73035d6ec6aa53add1
-
SSDEEP
49152:Ts51kZEsvhP4KUYTMb5C1JyWdLQqFxLCobXK45p4aE:Ts5eaKhgKUFCo2LP15s
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
-
-
Target
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db.exe
-
Size
927KB
-
MD5
d383c4a6d8c27294e80c5a7a881c5bce
-
SHA1
9273818d087b8f4216150094392d9fa017c6d80d
-
SHA256
4931b13a1265c5602753b3933aeb20740855f573997799ae8aed85ca66d193db
-
SHA512
d0d870f5e6796bf01f84358b282e03d6dbf3216ca6e5e6f9b81f6b1119287317ae4851442c892f792d80dbb8bc2e66982c5bdc12101425d8202b8ad646eafa34
-
SSDEEP
24576:JdtP2cbksTpugRNJI5kFMJF9OWjwjLOjZu:KgqQ
-
Nanocore family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695.exe
-
Size
74.0MB
-
MD5
2bcb124a4a22b161ad6ef74d8ae5cc47
-
SHA1
bdc51d9661236047e65356dd091577d08cd9bdf3
-
SHA256
4963d3411f742a92635dbd83146f3f5f7abed444f92750bcdd14072efd30e695
-
SHA512
3e2958750f3a067ed67d976b11c80dda2e41bf3fa583e83c3e6aa2d92976b8506a0b54379ee8871c49fdeff1ee58e46ed12ebd822b7c161acc6ef14254af5401
-
SSDEEP
12288:Wtgf5uSkiE2Iiy8oNzKwhLue8LCi5o38hvrknMnFd8xbpWcpClqCWYSFx9gQ1Od8:WPiO8ijXri1aOgTy2NR
Score3/10 -
-
-
Target
4981b96b4a936aa6e960d3d9604a63e4.exe
-
Size
1.1MB
-
MD5
4981b96b4a936aa6e960d3d9604a63e4
-
SHA1
ed6b971a4b9b8bc2d54bcf0c6f8ac0ab4f9a7907
-
SHA256
5e71574cc2ae7ab174cbd9d54c4d8931043f1d337e468c50db377191e93f34b9
-
SHA512
cb4693e1d3dd7e9febf15f57f3e79466701939b15e3555f20542a591a1f811951243660358da85fc3a17f4398117962820b6e9763936e775a15764a72752cf6d
-
SSDEEP
24576:6tP10G4YBZQwL45rZGspBeAHTITMuK0T+YwfXplDF+UnDtwKHr26P4:61+tYTwtBeUTQjKksTFvnDtJHS6P
Score3/10 -
-
-
Target
4996155e60aac91174cee14de1120fcb.exe
-
Size
80KB
-
MD5
4996155e60aac91174cee14de1120fcb
-
SHA1
9383aacd0e7b37ed7fb104dddb98885784d11899
-
SHA256
0a9fe4fa5ed9fa7066864cc89aaa4c2ed1a2d8f61b121b9ebd1daa45108397fa
-
SHA512
bb81036881efc3a2b527bcc3b8accc47c17cd66a807089e9706bf9bb3da6cb73086ca70730f7394ee9c3eec22664c7677ada1cd99c8adba73ae8bee3e4c4095c
-
SSDEEP
1536:BEnRM5P+PiiL7r2iN7joR7H6AJflcE13xebbl7qQVNyRHk96PkzYOdPgXlmC8Xo:enRM5P+PiiL7ZNQR7Z9d13xWbl7ZQlka
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
49986bd925df8b3a09e58c4999927830.exe
-
Size
1.6MB
-
MD5
49986bd925df8b3a09e58c4999927830
-
SHA1
40750b7b784db39850b805c151dfe76c9a6fdf30
-
SHA256
8d08430b6955cd7396f0e929bc2e098bab79adf22ff486fac8e07c369ebd9837
-
SHA512
4fb7adb39f1cfba3151cf099b14582e79ad3100c8de878a169bc2028f2bad9082b79ed94f1a8d0d7a441a00799f48c9a22e04eea0b7258930cda4569955b269a
-
SSDEEP
24576:Msm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:MD8Jijt+xpS/ekYmLGdhEAf7bCcjE
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
6Windows Service
6Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
6Windows Service
6Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
3Hidden Files and Directories
2Ignore Process Interrupts
1Impair Defenses
8Disable or Modify System Firewall
1Disable or Modify Tools
5Indicator Removal
1File Deletion
1Modify Registry
12Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1