General
-
Target
scary.exe
-
Size
75.3MB
-
Sample
250411-ygltnaytct
-
MD5
ca39d405dfa59baece7fdbfae5479674
-
SHA1
1c8b5c81ddb04c342a25518fe10be28294e323cf
-
SHA256
bfe1158258e04a58d37eab94edfe9cdf88438a0f7244747d73f81fd7c5798c4b
-
SHA512
5a5e37fc6e9148ed17cfb80657fd49a4d2346c5ab4e8311ea060bbe66829dc146b6feec45446163a334783279878eb89c3bb3bf2e5965fad333fd135e1712be5
-
SSDEEP
1572864:1X7oHaEUo7olZfWmsJme3ZwzCPSyeGEmjx/IwyVCOdjlBkhod8sz+cjpz0IE:1M98NWdhJwzCHeGfjNyMOdjDeodjUI
Static task
static1
Behavioral task
behavioral1
Sample
scary.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
scary.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
scary.exe
Resource
win11-20250410-en
Malware Config
Extracted
quasar
1.4.0
Office04
192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
1f65a787-81b8-4955-95e4-b7751e10cd50
-
encryption_key
A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9
-
install_name
Java Updater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Extracted
umbral
https://discord.com/api/webhooks/1360276909551915029/lC-vw7kRiqutkehNUDibMCgd2Hd6PFiq86JSv2ugXDPC7_FGRYRy6t4EL1s_Fy6LAyD6
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
marsstealer
Default
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
scary.exe
-
Size
75.3MB
-
MD5
ca39d405dfa59baece7fdbfae5479674
-
SHA1
1c8b5c81ddb04c342a25518fe10be28294e323cf
-
SHA256
bfe1158258e04a58d37eab94edfe9cdf88438a0f7244747d73f81fd7c5798c4b
-
SHA512
5a5e37fc6e9148ed17cfb80657fd49a4d2346c5ab4e8311ea060bbe66829dc146b6feec45446163a334783279878eb89c3bb3bf2e5965fad333fd135e1712be5
-
SSDEEP
1572864:1X7oHaEUo7olZfWmsJme3ZwzCPSyeGEmjx/IwyVCOdjlBkhod8sz+cjpz0IE:1M98NWdhJwzCHeGfjNyMOdjDeodjUI
-
Detect Umbral payload
-
Marsstealer family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Quasar family
-
Quasar payload
-
Stealerium family
-
Umbral family
-
Wannacry family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
ModiLoader Second Stage
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v16
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Power Settings
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1