Windows
Analysis Report
666.exe
Overview
General Information
Detection
DarkTortilla, Eternity Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected DarkTortilla Crypter
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: Capture Wi-Fi password
Yara detected Eternity Stealer
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Found Tor onion address
Tries to harvest and steal WLAN passwords
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Tries to harvest and steal Bitcoin Wallet information
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Connects to a pastebin service (likely for C&C)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Drops PE files to the application program directory (C:\ProgramData)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Queries information about the installed CPU (vendor, model number etc)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Binary contains a suspicious time stamp
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Classification
- System is w10x64
666.exe (PID: 2856 cmdline:
C:\Users\u ser\Deskto p\666.exe MD5: A2415C70A55FC6411F9679A0CB5A9041) JheRFreeJe.exe (PID: 5184 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft \Windows\S tart Menu\ Programs\J heRFreeJe. exe" MD5: F2CE67E03006106A1B4AFEFBA7ABB94C) InstallUtil.exe (PID: 2808 cmdline:
C:\Windows \Microsoft .NET\Frame work\v4.0. 30319\Inst allUtil.ex e MD5: EFEC8C379D165E3F33B536739AEE26A3) cmd.exe (PID: 1796 cmdline:
"cmd.exe" /C chcp 65 001 && net sh wlan sh ow profile | findstr All MD5: F3BDBE3BB6F734E357235F4D5898582D) conhost.exe (PID: 6084 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) chcp.com (PID: 2284 cmdline:
chcp 65001 MD5: 561054CF9C4B2897E80D7E7D9027FED9) netsh.exe (PID: 4724 cmdline:
netsh wlan show prof ile MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807) findstr.exe (PID: 6048 cmdline:
findstr Al l MD5: 8B534A7FC0630DE41BB1F98C882C19EC) cmd.exe (PID: 1776 cmdline:
"cmd.exe" /C chcp 65 001 && net sh wlan sh ow profile name="650 01" key=cl ear | find str Key MD5: F3BDBE3BB6F734E357235F4D5898582D) conhost.exe (PID: 472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496) chcp.com (PID: 4032 cmdline:
chcp 65001 MD5: 561054CF9C4B2897E80D7E7D9027FED9) netsh.exe (PID: 6016 cmdline:
netsh wlan show prof ile name=" 65001" key =clear MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807) findstr.exe (PID: 4500 cmdline:
findstr Ke y MD5: 8B534A7FC0630DE41BB1F98C882C19EC)
- cleanup
{"C2 url": ["http://rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion/"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | ||
JoeSecurity_EternityStealer | Yara detected Eternity Stealer | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_Discord_Regex | Detects executables referencing Discord tokens regular expressions | ditekSHen |
| |
JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | ||
JoeSecurity_DarkTortilla | Yara detected DarkTortilla Crypter | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID | Detects executables referencing Windows vault credential objects. Observed in infostealers | ditekSHen |
| |
Click to see the 5 entries |
Stealing of Sensitive Information |
---|
Source: | Author: Joe Security: |
Timestamp: | 192.168.2.523.226.74.1634970463522032083 10/24/22-09:21:49.562972 |
SID: | 2032083 |
Source Port: | 49704 |
Destination Port: | 6352 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 23.226.74.163192.168.2.56352497042032084 10/24/22-09:21:55.434864 |
SID: | 2032084 |
Source Port: | 6352 |
Destination Port: | 49704 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |