General
-
Target
pc raper.exe
-
Size
26.1MB
-
Sample
250420-jzq4rsytbv
-
MD5
769bf15770789de44c623b22536b9af8
-
SHA1
201bc12c782591a524b76a03c815251558bc0e21
-
SHA256
adfd4e9f51bcd27935f153e44b060b6978f55da9135f34cc62361dbbf2d2db57
-
SHA512
5ea37c53c01596c067824c698e234b3cddbae8f37ccfe5588629e9bd68eeab3a84b9e3985899f3686d247153f19945b3155ab52899f0e7049f0375c0c8740c18
-
SSDEEP
393216:c7Uy3zMOT7pkSmtK0NsDrAggcSYwybUG7Syl3SIspfXvYKiTSOQ1edHpDnWK:Q4MOSkqvAggG1QmSycIifXvzTPK
Static task
static1
Behavioral task
behavioral1
Sample
pc raper.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
pc raper.exe
Resource
win11-20250410-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
they-mailed.gl.at.ply.gg:34942:34942
they-mailed.gl.at.ply.gg:34942
VQd9MfbX4V71RInT
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
C:\Users\Public\Documents\RGNR_8CA3C997.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
quasar
1.4.1
botnet
165.227.31.192:22069
193.161.193.99:64425
193.161.193.99:60470
713051d4-4ad4-4ad0-b2ed-4ddd8fe2349d
-
encryption_key
684009117DF150EF232A2EE8AE172085964C1CF0
-
install_name
System.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Office
-
subdirectory
Winrar
Extracted
quasar
1.4.1
Office04
Extazz24535-22930.portmap.host:22930
73.62.14.5:4782
89f58ee5-7af9-42de-843f-2a331a641e3f
-
encryption_key
CD4F349DEB46AEE10C2FE886E5B2BD7A766723CE
-
install_name
2klz.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
Stinky
ef3243fsert34.ddns.net:47820
oj42315j346ng2134.myvnc.com:47820
448b82a7-900f-48ac-b52b-73d8b9b1a9fa
-
encryption_key
7A23123B6E1E0CCDB27477C6C7654C7BE2FEDE54
-
install_name
sru.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
xml
-
subdirectory
sru
Extracted
quasar
1.4.1
21325
146.190.110.91:13000
e5627e25-0d0e-4509-8b39-a3de07ba1545
-
encryption_key
3B7163AA2D236AA40236BB7204ED370202AD4ABE
-
install_name
explorer.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MicrosoftQuasUpdate
-
subdirectory
explorer
Extracted
F:\$RECYCLE.BIN\S-1-5-21-599783296-1627459723-2423478968-1000\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Extracted
quasar
1.5.0
BruterV3
147.185.221.17:44915
3b364ea6-0ab3-4606-8c9e-e2b51e68c3b8
-
encryption_key
E679E56ABD1A0F53D68F323812B24E67488502F6
-
install_name
Bruter.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows_Host_Process
-
subdirectory
RealtekAudio
Targets
-
-
Target
pc raper.exe
-
Size
26.1MB
-
MD5
769bf15770789de44c623b22536b9af8
-
SHA1
201bc12c782591a524b76a03c815251558bc0e21
-
SHA256
adfd4e9f51bcd27935f153e44b060b6978f55da9135f34cc62361dbbf2d2db57
-
SHA512
5ea37c53c01596c067824c698e234b3cddbae8f37ccfe5588629e9bd68eeab3a84b9e3985899f3686d247153f19945b3155ab52899f0e7049f0375c0c8740c18
-
SSDEEP
393216:c7Uy3zMOT7pkSmtK0NsDrAggcSYwybUG7Syl3SIspfXvYKiTSOQ1edHpDnWK:Q4MOSkqvAggG1QmSycIifXvzTPK
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Xworm Payload
-
Detects Go variant of Hive Ransomware
-
Hive family
-
Marsstealer family
-
Mimikatz family
-
Nanocore family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Quasar family
-
Quasar payload
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Ragnarlocker family
-
Squirrelwaffle family
-
Wannacry family
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3321) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Squirrelwaffle payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
2File Deletion
2Modify Registry
2Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1