General
-
Target
dc467b57f0ac29a0ee0e1ed3c0e551c614f3c5e8b6a7c60c2e1c7e93a83f8d0d.exe
-
Size
225KB
-
Sample
250410-xyamaazzd1
-
MD5
b064c5c39eff3fb294144ed8a93966ea
-
SHA1
8a2686a5e8b1876c17e41bb3ee15477473fd567e
-
SHA256
dc467b57f0ac29a0ee0e1ed3c0e551c614f3c5e8b6a7c60c2e1c7e93a83f8d0d
-
SHA512
7c8b59d8e9b9cae517f7b342eec504f8276fe0515fc9148df9f48d4f353cdb9b895196c8734c0e212c27bc9f4d11b3bd9202d4ebf50d472dffdb9082fa3e1a2e
-
SSDEEP
3072:Ms1WvJ6f79wMK4+2GimcVRe+DvDDrhojDRmcldCKcW4OVWhMO:McWvS2MKdilBTDqj0kCk4Oy
Static task
static1
Behavioral task
behavioral1
Sample
dc467b57f0ac29a0ee0e1ed3c0e551c614f3c5e8b6a7c60c2e1c7e93a83f8d0d.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkvision
toolsdns.ddns.net
Targets
-
-
Target
dc467b57f0ac29a0ee0e1ed3c0e551c614f3c5e8b6a7c60c2e1c7e93a83f8d0d.exe
-
Size
225KB
-
MD5
b064c5c39eff3fb294144ed8a93966ea
-
SHA1
8a2686a5e8b1876c17e41bb3ee15477473fd567e
-
SHA256
dc467b57f0ac29a0ee0e1ed3c0e551c614f3c5e8b6a7c60c2e1c7e93a83f8d0d
-
SHA512
7c8b59d8e9b9cae517f7b342eec504f8276fe0515fc9148df9f48d4f353cdb9b895196c8734c0e212c27bc9f4d11b3bd9202d4ebf50d472dffdb9082fa3e1a2e
-
SSDEEP
3072:Ms1WvJ6f79wMK4+2GimcVRe+DvDDrhojDRmcldCKcW4OVWhMO:McWvS2MKdilBTDqj0kCk4Oy
Score10/10-
Darkvision family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Suspicious use of SetThreadContext
-