General
-
Target
random.exe
-
Size
938KB
-
Sample
250404-wyfmvstry9
-
MD5
cbf68f77f4cd12e46a80430a739ce71f
-
SHA1
de3df5da3f6cbf132a17cd4b160dfe484c5725b5
-
SHA256
bbd0e0c8992b91a114ccb9ecba91d146ae17a35a5b85a1c107fd273d18b4e089
-
SHA512
7a6fe5f78c7c068d196912edd2bd7e4bf5fc679ffdb198fe0ef9677b297bef9b7fa5416f1d930bc4f26bb23d20aab5dee653d386a55a5978a6be1506b406fb28
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8a0yu:6TvC/MTQYxsWR7a0y
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win11-20250313-en
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://reboundui.live/aomgd
https://jrxsafer.top/shpaoz
https://krxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://xrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://gkrxspint.digital/kendwz
https://erhxhube.run/pogrs
https://28jrxsafer.top/shpaoz
https://kadvennture.top/GKsiio
https://ogrxeasyw.digital/xxepw
https://navstarx.shop/FoaJSi
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://rodformi.run/aUosoz
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
Extracted
meshagent
2
test123
http://aaso12.duckdns.org:443/agent.ashx
-
mesh_id
0x0CF4A8B0663DD2F1D3A44CE8D231621166DBDB1E723B374C911544DE2F45A87C6C52F7206CED32F5B6A52A5551B75A3C
-
server_id
22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8
-
wss
wss://aaso12.duckdns.org:443/agent.ashx
Extracted
http://176.113.115.7/mine/random.exe
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Targets
-
-
Target
random.exe
-
Size
938KB
-
MD5
cbf68f77f4cd12e46a80430a739ce71f
-
SHA1
de3df5da3f6cbf132a17cd4b160dfe484c5725b5
-
SHA256
bbd0e0c8992b91a114ccb9ecba91d146ae17a35a5b85a1c107fd273d18b4e089
-
SHA512
7a6fe5f78c7c068d196912edd2bd7e4bf5fc679ffdb198fe0ef9677b297bef9b7fa5416f1d930bc4f26bb23d20aab5dee653d386a55a5978a6be1506b406fb28
-
SSDEEP
24576:6qDEvCTbMWu7rQYlBQcBiT6rprG8a0yu:6TvC/MTQYxsWR7a0y
-
Amadey family
-
Darkvision family
-
Detects MeshAgent payload
-
Lumma family
-
Meshagent family
-
Modifies security service
-
Contacts a large (5286) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Sets service image path in registry
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Safe Mode Boot
1Modify Registry
3Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Network Service Discovery
2Peripheral Device Discovery
1Process Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2