Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
102ed5096b88...b5.exe
windows7-x64
102ed5096b88...b5.exe
windows10-2004-x64
102ee9655c23...67.exe
windows7-x64
102ee9655c23...67.exe
windows10-2004-x64
102eff63cdfb...1a.exe
windows7-x64
102eff63cdfb...1a.exe
windows10-2004-x64
102f148dd5c5...0b.exe
windows7-x64
102f148dd5c5...0b.exe
windows10-2004-x64
102f20805841...4a.exe
windows7-x64
102f20805841...4a.exe
windows10-2004-x64
102f3c6dcb67...d1.exe
windows7-x64
32f3c6dcb67...d1.exe
windows10-2004-x64
32f3ef255d9...18.exe
windows7-x64
82f3ef255d9...18.exe
windows10-2004-x64
82f51ba1ede...be.exe
windows7-x64
102f51ba1ede...be.exe
windows10-2004-x64
102f61e23326...8e.exe
windows7-x64
102f61e23326...8e.exe
windows10-2004-x64
102f8f60984e...42.exe
windows7-x64
102f8f60984e...42.exe
windows10-2004-x64
102faeca4666...e9.exe
windows7-x64
102faeca4666...e9.exe
windows10-2004-x64
102fd4eb3e27...82.exe
windows7-x64
102fd4eb3e27...82.exe
windows10-2004-x64
102fde7f3ffb...c6.exe
windows7-x64
102fde7f3ffb...c6.exe
windows10-2004-x64
1030143fedf8...ac.exe
windows7-x64
1030143fedf8...ac.exe
windows10-2004-x64
10301cceb8e4...db.exe
windows7-x64
10301cceb8e4...db.exe
windows10-2004-x64
103020571d24...5f.exe
windows7-x64
103020571d24...5f.exe
windows10-2004-x64
10General
-
Target
archive_12.zip
-
Size
30.9MB
-
Sample
250322-gwqygstjt5
-
MD5
01b14dcd8632a3f46ed0eb3ab458bec1
-
SHA1
1f14cd3b3cdb248861bac37bb292b9714a9bd384
-
SHA256
fd198cf3ef764ffa17e7bd465d666057804a25ed5c6061074c0de7b6df43a667
-
SHA512
5c98011563f9bb645402940e7a551791d535d9cc0c92d9f04187140c370909f6ad300114db3d2ad65820a0663195952947af3d112c7e36e3dbb0ec8dffb01336
-
SSDEEP
786432:IPa+//yxNDXN6u4g+7/yQ37J0XOyQ37QTyQ37mPaL//yxNIOyQ37dc6:Ira3Fa7aQlGQceQaea4QZz
Behavioral task
behavioral1
Sample
2ed5096b882676b134d0935da3ef223d65987bcf50b0b15b63515eabfb4f40b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ed5096b882676b134d0935da3ef223d65987bcf50b0b15b63515eabfb4f40b5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
2ee9655c23e38841be4731180b89a967.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2ee9655c23e38841be4731180b89a967.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
2eff63cdfbb658f2a6e69851e7de131a.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2eff63cdfbb658f2a6e69851e7de131a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
2f148dd5c5e1754e666715462f5a410b.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
2f148dd5c5e1754e666715462f5a410b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
2f208058419a16ca3fa3574867071b4a.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2f208058419a16ca3fa3574867071b4a.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
2f3c6dcb6788a3f4fa590f81130679d1.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
2f3c6dcb6788a3f4fa590f81130679d1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
2f3ef255d917f50ba453d9e3856d730438a86f2e419fc17c8bcc8f40e4a6f218.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
2f3ef255d917f50ba453d9e3856d730438a86f2e419fc17c8bcc8f40e4a6f218.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
2f51ba1ede9584e95a2dea20a67369be.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
2f51ba1ede9584e95a2dea20a67369be.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
2f61e23326b11de39e126e1baf46488e.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
2f61e23326b11de39e126e1baf46488e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
2f8f60984eeeb021676bd9fcf791dd42.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
2f8f60984eeeb021676bd9fcf791dd42.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
2faeca4666ab05cf6704a2976357a5783bec6deb9c377aac3c94088405ce14e9.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
2faeca4666ab05cf6704a2976357a5783bec6deb9c377aac3c94088405ce14e9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
2fd4eb3e27778484c6c7d957a980c00563b9e5b83750393d08aa39154a7cff82.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
2fd4eb3e27778484c6c7d957a980c00563b9e5b83750393d08aa39154a7cff82.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
2fde7f3ffb6b753f4f38d56d9b5a7cc6.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
2fde7f3ffb6b753f4f38d56d9b5a7cc6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
30143fedf8d4f08b82ae24f18f50e5ac.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
30143fedf8d4f08b82ae24f18f50e5ac.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
301cceb8e4221cd718e3c661b8ade26f604d90eb15652b5842fefee4fcf1e8db.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
301cceb8e4221cd718e3c661b8ade26f604d90eb15652b5842fefee4fcf1e8db.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
3020571d24ad91e5aabd74a3c92f5014ee1f3aa8805d066e34a9289b4325d75f.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
3020571d24ad91e5aabd74a3c92f5014ee1f3aa8805d066e34a9289b4325d75f.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
xworm
activity-majority.gl.at.ply.gg:44249
hours-rwanda.gl.at.ply.gg:56111
26.ip.gl.ply.gg:53142
-
Install_directory
%Public%
-
install_file
Runtime Broker.exe
-
telegram
https://api.telegram.org/bot7657358333:AAGqjkQn3Y1tidi4Fg35oc8a1cgXRB-oI2U/sendMessage?chat_id=5998738333
Extracted
silverrat
1.0.0.0
american-designed.gl.at.ply.gg:50767
lAxDBRhAFu
-
certificate
MIIE4DCCAsigAwIBAgIQAKQYOfZd86J2BfNjhG4CWTANBgkqhkiG9w0BAQ0FADARMQ8wDQYDVQQDDAZTaWx2ZXIwIBcNMjIwODI2MTkwMTA4WhgPOTk5OTEyMzEyMzU5NTlaMBExDzANBgNVBAMMBlNpbHZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPbpOWfhZTuOfEaqqImTTe5dNHAAry7/mf00DCoI4lPZfypsc1tYraxSPFeayGu09a3qdhkWKSVIgwnu2n4GLQNOCY9fh/1oyrX4Iir3BIkYeU7pKTWgjhUlAmFAUAaNr0ca23Ku2kN79jrDzRznOgE2DEW4p7OiM4Mb097ma9lzu7MyssHbY4VCteAhj9HZiplqBxaC1vXDmzxqG+gUZ1aLcyG7ssdkOjtWVBgT3gD/gOl7KchRzCFB1egDC/vD9WZCG35U3Ngi+IkTznoXR1R06cq4v0UnGjE37R2vcB21qb0ZYNiZJXZHv5i9+R7xoPeNoLda5PqnfGGbhPvNEdD56mdcOKlzGIuyemLkUo8texdpiBWKbtc3JZf5VsKxjJtHDK3xW6gDGI+PAirzGkFPmwcf8WgsblvzLg8OZpVxVs8rmKWoi6qIrf4CXnyl73J4lgzW+ir7PjANAQXwLNGdNnvdMeLeo/muGQPdeNpr6OczGGnkWA4qniHeL51/Gx0a8A+jP9zKiyu+qHcsP2IotgWDH/KlzJVr7IAum+DV92uV8poTDcUNcHaKvhHA65KmEtsvLbK6lFZcAMC0eWC0VgpW44T1/16rOaaky5mP6rTMc3nSyOl/lU/XgAgGGQPe22bRLWYzd3WVeEpI1WnHYXS+tL9IOe4kJP+pYsWDAgMBAAGjMjAwMB0GA1UdDgQWBBR32TJj2LeUx9L+RcSOvmFV6VJq6TAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQA+qucSOi7ov7Q1FmAjMf925KuvKuCNwJiu3Sqo3FDGVAD1fAwAi2FdyuXEO2VIUPZCkalFcBna5rqyrc6tcS4T0IL2TsYLrsuGir7PWP7CAcft1urYS1HpNpHxeH/nixwnQaQs/MuRmdm2TeCj6G21P5BTW55U5y9sMPSYwhbD2N7XLgnSQd5Y+80TR7FUiye/k3D37fI9PRhSQGbfYFRQQTmxj84dPTnY5CVgaY9d8fNiFZkyjaZdf+mibK0xQTf+xLVVj+toDNCkc1F462TdmFhCrHd4PoMo0yLDNv4SC6NLRq4haWDRtORw6gd5GYIoCQ3m3oQvNlNxXhhIjsOyxkxOrkCD0c+57PIc7EmKXieJa/XxnkcIVxO8dvTY/vijuz/VaZYl/lPu9ckuqgJ1wRvvsHl70Trv4Mn4X5uCIqRFFlK/mSOZbLIguGkDN3QIZABvej89vlZMhrVfZOG2oawe23FskHjv7thF/WzOXtWw6RUVC1V+hCwbuxFNUjZmmOTUwdXHnus7I2AuiG6Jz1+y9aYiXBcVTdSljxjHRRmiRaAnY94h58vN8NJ4hKL2GVCo6LxkpuplmcntJN0cKraKTPxSXcCRrqWxX9qoIbfvBcUU4vH1jPJCCLNCuDyD3lgQkpPVvq0EMU1a2HFGgMEQMjpYpb38rcadDhT5ag==
-
decrypted_key
-|S.S.S|-
-
key
yy6zDjAUmbB09pKvo5Hhug==
-
key_x509
b0FGeVZNcFRMWVloVHR6Z0VESU5RdlpZUmxZbUFE
-
reconnect_delay
1
-
server_signature
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
Extracted
umbral
https://discord.com/api/webhooks/1352030769437999154/eHu9teXq3wb8vwo-mbucZM6yN8mzEkClwJkHlfw6PYnKb7ka01uXXl9PnwprVKtnEAcK
Extracted
xworm
5.0
26.ip.gl.ply.gg:64114
178.173.236.10:7000
umIoBtEHzCp9rce5
-
Install_directory
%Temp%
-
telegram
https://api.telegram.org/bot8077594773:AAHYskqxgBzgnMjO1ZgcDV6YMtdGVJITdy0/sendMessage?chat_id=7936506106
Extracted
remcos
1.7 Pro
Host
213.183.58.19:4000
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
read.dat
-
keylog_flag
false
-
keylog_folder
CastC
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
remcos_sccafsoidz
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
nanocore
1.2.2.0
4af74541-e3f1-469c-8af7-efe4071b81cf
-
activate_away_mode
false
-
backup_connection_host
178.32.224.116
- backup_dns_server
-
buffer_size
65535
-
build_time
2018-07-28T12:59:38.488799236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
46218
-
default_group
tourex
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
4af74541-e3f1-469c-8af7-efe4071b81cf
-
mutex_timeout
5000
-
prevent_system_sleep
false
- primary_connection_host
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Targets
-
-
Target
2ed5096b882676b134d0935da3ef223d65987bcf50b0b15b63515eabfb4f40b5.exe
-
Size
2.0MB
-
MD5
92b1cb315e282e07a726d141f8fc481c
-
SHA1
f5b14319b7736887beec6fc505ee427dcfbd45e0
-
SHA256
2ed5096b882676b134d0935da3ef223d65987bcf50b0b15b63515eabfb4f40b5
-
SHA512
b44d6c86f937965ffb31a91b9ca965ae0ee4449441f0d72d2615e2399a25f006b5768d809a2b4f60ba12dc80b32cd3b9fc918fe8d5ffeca915728ae66b740cd7
-
SSDEEP
49152:brYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:bdxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
2ee9655c23e38841be4731180b89a967.exe
-
Size
68KB
-
MD5
2ee9655c23e38841be4731180b89a967
-
SHA1
092f21246d35e965195a1fc24a78f92c0173d79d
-
SHA256
73b62e276faa18be5bb73c9f26ba43c6dd456cf6999db0f995c06f9041c4bf83
-
SHA512
2555327bdeeb5e2de612862bd9c3dfbc5cce7fed9f1abbfe577549bcfacfb6efbc8f92df23d6f87058a2f5e14eb4b9cc3f329a8fc6bfb80ceb0099139c0f3a0c
-
SSDEEP
1536:qpNdh5WbHFnvL1FJOOmbk4G6Z5ax4J2/N6VHdyiJUkObc9J:qjdzOnvLzJtmbk/Y5a+vH/JUkObc9J
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
2eff63cdfbb658f2a6e69851e7de131a.exe
-
Size
5.9MB
-
MD5
2eff63cdfbb658f2a6e69851e7de131a
-
SHA1
8a9e262a7319d2699cbee02b9de83fecd4bb3457
-
SHA256
5174e6fefa2a518cdaadb75f07a9bb7f9aaa6e0e24ba1610d3e400036cf02900
-
SHA512
3e3ea7e36e9dbaa5a969846f575f5138ba416a88bdc07f1e99af66a6c18a458434c680ade203dda242be3aa10c02c21e3f9427ad39ef90b72cc03855ddc93e40
-
SSDEEP
98304:hyeUxPQ0JMLyWIvqrhH05I8TderKjHDFUh9HkEXJfw4T:hyeU11Rvqmu8TWKnF6N/1wO
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
UAC bypass
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
2f148dd5c5e1754e666715462f5a410b.exe
-
Size
885KB
-
MD5
2f148dd5c5e1754e666715462f5a410b
-
SHA1
0c5f8fcab489df669639c334af2e1f1e4868fab6
-
SHA256
070cd87bc58c7b6dc8a21b89e93a548f173fcc7668f68c2e9462ce18eeccf11a
-
SHA512
a515fe57b44d71a0709e9a1cb56f5c2f87bc9cf609ee111af21b12bae620305a2df102b93d34c48784bbcdba39092e8eeb2be5f15cbf99ba256c973172c7e4fe
-
SSDEEP
12288:UlNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:UlNCv6XJ5BClaXfD9vUha+u
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
-
-
Target
2f208058419a16ca3fa3574867071b4a.exe
-
Size
43KB
-
MD5
2f208058419a16ca3fa3574867071b4a
-
SHA1
ebaf2a437720c0d5915fee4f2943d35ff70d7258
-
SHA256
572b99caeb57f1999a3c7ec8ebea458cbde138bec44ed5531b8877249a1f594f
-
SHA512
e1c720cc30303303d7d850e5d72fce2d8e1274739b46516e684ea2761446fe090b35e58c4aa1e7405c1908e0dc614767cec3b749b262e5dde6370dfc02427967
-
SSDEEP
768:aR8c2Sev8VX/Ol6IoZmLPHBm7p4A6+HWbxk5XORULQI9PNGUz1QB6Sj/lo:aR8c2SeMwt5Jml5bWOOGsI94I1Qo4/lo
-
Silverrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
2f3c6dcb6788a3f4fa590f81130679d1.exe
-
Size
4KB
-
MD5
2f3c6dcb6788a3f4fa590f81130679d1
-
SHA1
f0496390d2b5d507d022e1e67806fdcd17a3e44b
-
SHA256
d6c8197b3728c7dc51a8d13d3f7fc236cf93e1d75b70b1f8b5a37226b505b501
-
SHA512
58a643ff40471534e0d761454b65052ca6deb7c5a27d338487743563c6f7557f54ef8ff83d5a7a6f7211c079491e830f54a24172859cd6667c257a0cc90918eb
-
SSDEEP
48:6emltbaxZ8RxeOAkFJOcV4MKe28dZvqBHvuulB+hnqXSfbNtm:4VTxvxVx95vkBTkZzNt
Score3/10 -
-
-
Target
2f3ef255d917f50ba453d9e3856d730438a86f2e419fc17c8bcc8f40e4a6f218.exe
-
Size
3.3MB
-
MD5
ef68c86e5dbf79b7501ba7ee7a00db7a
-
SHA1
7629c9ad3c0dbc30a6367adeb54f495abdd9a0ac
-
SHA256
2f3ef255d917f50ba453d9e3856d730438a86f2e419fc17c8bcc8f40e4a6f218
-
SHA512
c79e0ed5bc4985b5e809e1710a4b2010490e924ddaa052d7ef9d44fcb5f4dffd83be9bd41fa07061a3e10e5fd053bda2ef18616e7f33e688cf023059d9e5a63b
-
SSDEEP
98304:eRS6nfSOQZOt+CW+7EELhF3gxpNOf2k2Y/R/j:ekj8NBFwxpNOuk26j
Score8/10-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
2f51ba1ede9584e95a2dea20a67369be.exe
-
Size
78KB
-
MD5
2f51ba1ede9584e95a2dea20a67369be
-
SHA1
cc386ce71edb2c6ced31fff9c396ae1fe988d8a8
-
SHA256
3e4643d89c807e25e8bbcacf4b7274b466e88f11185f183b320eab95bc889d43
-
SHA512
81d69dedf94ee7fb0f129c29778a8510af7e905c37eb915662c5259c18a3c8dfe377cc6dc1a18cc3da619f4305def72cd014ac0196cdc2faa895ef51990e332a
-
SSDEEP
1536:sJPWtHH638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtzb9/r1wL:sJPWtHa3Ln7N041Qqhgzb9/o
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
-
-
Target
2f61e23326b11de39e126e1baf46488e.exe
-
Size
2.0MB
-
MD5
2f61e23326b11de39e126e1baf46488e
-
SHA1
530a94ef319c7ef102cc3ddc19ff2f0dcd891565
-
SHA256
d5c20e1b5c91b69d26064a9a539d6e262218630a99cfb06955bcb7e3a4108f36
-
SHA512
beaea9e6314ab6ef4123666cb50da724c774713fcadb9106f15513e20d8ddebd67a6e84875f0e037e6f53acc2dc6f696061f27d0a5a32bb2196ee81e6dad10fd
-
SSDEEP
49152:7rYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:7dxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
2f8f60984eeeb021676bd9fcf791dd42.exe
-
Size
65KB
-
MD5
2f8f60984eeeb021676bd9fcf791dd42
-
SHA1
b3806c7c5890cf44a8709fc5a7ae28ba6abf8571
-
SHA256
4c6151582b07c50f82e0a6c06b1762791019db26a4a9d43c9144585d357829b7
-
SHA512
dbab51e363fd034bcab27c86bf75a8590383775dac0c491afcbca16db074dfc0845da3084f3c34459257c89dc51e07ff9ae84053beabc3d82e14c57ead82481c
-
SSDEEP
1536:pc89KDltkLtEXs4Oannbao5X+x6uJPOiDneklYaTP:S89kEXXYba/7OiDnhlP
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
2faeca4666ab05cf6704a2976357a5783bec6deb9c377aac3c94088405ce14e9.exe
-
Size
183KB
-
MD5
25aeb519d4e4e511a014053e5671b2df
-
SHA1
46ceafdfd2f51018e9fa80b0e6c2c675b81ed547
-
SHA256
2faeca4666ab05cf6704a2976357a5783bec6deb9c377aac3c94088405ce14e9
-
SHA512
3c8d9bcb1bd3207fcfb65bffb865276f59a1486221e9e24f5d6a2f0382a7a31bb30aa87a90aa410061c855d549545a366ff000dc5128bcb7d830e7e90940943b
-
SSDEEP
3072:XmP7SGeqAiGs7tQbihaXIVjtKLqJGH63cDBvyxJD2OW9bpXjWkwmfoo:W2GEmyihaXGtKLqJ1s1yHD2Oeb0Lmfo
Score10/10-
Modifies WinLogon for persistence
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
2fd4eb3e27778484c6c7d957a980c00563b9e5b83750393d08aa39154a7cff82.exe
-
Size
1.7MB
-
MD5
af3051e752cce78b57735f04d7d5c848
-
SHA1
e64d7999e191b361d85634cb9144bad9026d070d
-
SHA256
2fd4eb3e27778484c6c7d957a980c00563b9e5b83750393d08aa39154a7cff82
-
SHA512
113ccb90d689343e5512975e5c277dd6bb3aa5422cfdc4ccffd85ca3831277fd4c0a5559cce1c6531c88691cb2172287820975f435ebb737a6f72baf92a06613
-
SSDEEP
24576:DD39v74lfGQrFUspugRNJI2DJ53J/J/L5dJPjos:Dp7E+QrFUBgq2x
-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
2fde7f3ffb6b753f4f38d56d9b5a7cc6.exe
-
Size
42KB
-
MD5
2fde7f3ffb6b753f4f38d56d9b5a7cc6
-
SHA1
d1db9a01cda04ba123dd98fd84675bcec94bdad4
-
SHA256
6c97ecc2c61d32ed69642e73d95768d47cff87f2e6f71d3561ed5b23ffede4e5
-
SHA512
0dd9a010aade521d8450e30fc9f465498a977ae26e74e3725f00540e276387ee979d6e8608d9faca124521413a55ac45836a0ee05fff8f225bba198b14099799
-
SSDEEP
384:Tn07iHzfrw+BNPMRTPfckQn2ki/ftcRg2/+QNa95V4doERUrT0h+glcoCL78LY09:TciQqPGkke21/fm7xJRUrOw78LvaD8
-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
30143fedf8d4f08b82ae24f18f50e5ac.exe
-
Size
53KB
-
MD5
30143fedf8d4f08b82ae24f18f50e5ac
-
SHA1
e31de66bbdf8aad355a6e8c6c98f591ba2d1d8ff
-
SHA256
8b05a54bc8f930d8a9ed6db438e3bbff857b5a65cc309195f884e177f1cae263
-
SHA512
cbc44f3681145245354d23adc979f224c05e34dfeadad0c74a800c278616f59c4f4b9e545079e840a1cc9aa7bbf2ffd776569820a0410561f0b00b159fd1759e
-
SSDEEP
768:a4jAmlg/qrWt05vQ7z2TRl3XOnn+G/kboEP0rZDY2Trm0pdSmifj6YOHSJNhwFI0:a+AEgAcYv8xkboK3sDpd+7lOHYNv6
-
Detect Xworm Payload
-
Xworm family
-
Drops startup file
-
-
-
Target
301cceb8e4221cd718e3c661b8ade26f604d90eb15652b5842fefee4fcf1e8db.exe
-
Size
1.6MB
-
MD5
e9a51358da08f22af241931abad598ae
-
SHA1
04afc75b8bd8a406d03b844292ac955499feb7bf
-
SHA256
301cceb8e4221cd718e3c661b8ade26f604d90eb15652b5842fefee4fcf1e8db
-
SHA512
fe3c8a7ecca641122815dc2ecdaec54811318291df3fd278a9516e5a87b95b76b92caef20efbdf382bf286fa5d3d71ddc35d53a8097b5972e8c03a7b1cc36eab
-
SSDEEP
24576:qsm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:qD8Jijt+xpS/ekYmLGdhEAf7bCcjE
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
3020571d24ad91e5aabd74a3c92f5014ee1f3aa8805d066e34a9289b4325d75f.exe
-
Size
418KB
-
MD5
c157899ac1cd17ceb52c43b403dbf647
-
SHA1
85036f05dc58d68c8f9dca29a2a69a1e8b55b08d
-
SHA256
3020571d24ad91e5aabd74a3c92f5014ee1f3aa8805d066e34a9289b4325d75f
-
SHA512
95d9bed3103191c765d67a4babc57538e0e490c9a354fddeb351f541253cef5af3a23f223ac7453a51a4f8952d99ef0e91b8bdedcb15f9bfa888e305fe51811a
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUwbvh:ITNYrnE3bm/CiejewY5vXJ
-
Nanocore family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1