General
-
Target
scary.exe
-
Size
75.3MB
-
Sample
250411-2jby1s1rt6
-
MD5
ca39d405dfa59baece7fdbfae5479674
-
SHA1
1c8b5c81ddb04c342a25518fe10be28294e323cf
-
SHA256
bfe1158258e04a58d37eab94edfe9cdf88438a0f7244747d73f81fd7c5798c4b
-
SHA512
5a5e37fc6e9148ed17cfb80657fd49a4d2346c5ab4e8311ea060bbe66829dc146b6feec45446163a334783279878eb89c3bb3bf2e5965fad333fd135e1712be5
-
SSDEEP
1572864:1X7oHaEUo7olZfWmsJme3ZwzCPSyeGEmjx/IwyVCOdjlBkhod8sz+cjpz0IE:1M98NWdhJwzCHeGfjNyMOdjDeodjUI
Static task
static1
Behavioral task
behavioral1
Sample
scary.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
quasar
1.4.0
Office04
192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
1f65a787-81b8-4955-95e4-b7751e10cd50
-
encryption_key
A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9
-
install_name
Java Updater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/exec
Extracted
marsstealer
Default
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
scary.exe
-
Size
75.3MB
-
MD5
ca39d405dfa59baece7fdbfae5479674
-
SHA1
1c8b5c81ddb04c342a25518fe10be28294e323cf
-
SHA256
bfe1158258e04a58d37eab94edfe9cdf88438a0f7244747d73f81fd7c5798c4b
-
SHA512
5a5e37fc6e9148ed17cfb80657fd49a4d2346c5ab4e8311ea060bbe66829dc146b6feec45446163a334783279878eb89c3bb3bf2e5965fad333fd135e1712be5
-
SSDEEP
1572864:1X7oHaEUo7olZfWmsJme3ZwzCPSyeGEmjx/IwyVCOdjlBkhod8sz+cjpz0IE:1M98NWdhJwzCHeGfjNyMOdjDeodjUI
-
Detect Umbral payload
-
Marsstealer family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Quasar family
-
Quasar payload
-
Stealerium family
-
Umbral family
-
Wannacry family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
ModiLoader Second Stage
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v16
Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2