General
-
Target
scary.exe
-
Size
75.3MB
-
Sample
250411-yjg89aytey
-
MD5
ca39d405dfa59baece7fdbfae5479674
-
SHA1
1c8b5c81ddb04c342a25518fe10be28294e323cf
-
SHA256
bfe1158258e04a58d37eab94edfe9cdf88438a0f7244747d73f81fd7c5798c4b
-
SHA512
5a5e37fc6e9148ed17cfb80657fd49a4d2346c5ab4e8311ea060bbe66829dc146b6feec45446163a334783279878eb89c3bb3bf2e5965fad333fd135e1712be5
-
SSDEEP
1572864:1X7oHaEUo7olZfWmsJme3ZwzCPSyeGEmjx/IwyVCOdjlBkhod8sz+cjpz0IE:1M98NWdhJwzCHeGfjNyMOdjDeodjUI
Static task
static1
Behavioral task
behavioral1
Sample
scary.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
scary.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral3
Sample
scary.exe
Resource
win11-20250410-en
Malware Config
Extracted
quasar
1.4.0
Office04
192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
1f65a787-81b8-4955-95e4-b7751e10cd50
-
encryption_key
A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9
-
install_name
Java Updater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/exec
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
marsstealer
Default
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
scary.exe
-
Size
75.3MB
-
MD5
ca39d405dfa59baece7fdbfae5479674
-
SHA1
1c8b5c81ddb04c342a25518fe10be28294e323cf
-
SHA256
bfe1158258e04a58d37eab94edfe9cdf88438a0f7244747d73f81fd7c5798c4b
-
SHA512
5a5e37fc6e9148ed17cfb80657fd49a4d2346c5ab4e8311ea060bbe66829dc146b6feec45446163a334783279878eb89c3bb3bf2e5965fad333fd135e1712be5
-
SSDEEP
1572864:1X7oHaEUo7olZfWmsJme3ZwzCPSyeGEmjx/IwyVCOdjlBkhod8sz+cjpz0IE:1M98NWdhJwzCHeGfjNyMOdjDeodjUI
-
Detect Umbral payload
-
Marsstealer family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Quasar family
-
Quasar payload
-
Stealerium family
-
Umbral family
-
Wannacry family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v16
Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1