General

  • Target

    qbsubf8fng_AGOSTO_DOC21408001.doc

  • Size

    1.4MB

  • Sample

    210416-b4hjz3m7c2

  • MD5

    53a47a7554872f55e5d4cf09d9598b20

  • SHA1

    6d8d37d0cdbfb96d79eb69e05766ee40393fcd63

  • SHA256

    27ce70fee0c8e0e90e20dfd2f1e2db5d5a13b8857be1dfd2142f04ab77bc6510

  • SHA512

    f8764308302ec4088ba5c2f6ea8efc06de66e771932d42a22b449fcfb32b3afc5fdf98a7417291cbef36cfcdbbf494b3983faa03bef43c3bb9c16a1bfb796f19

Malware Config

Targets

    • Target

      qbsubf8fng_AGOSTO_DOC21408001.doc

    • Size

      1.4MB

    • MD5

      53a47a7554872f55e5d4cf09d9598b20

    • SHA1

      6d8d37d0cdbfb96d79eb69e05766ee40393fcd63

    • SHA256

      27ce70fee0c8e0e90e20dfd2f1e2db5d5a13b8857be1dfd2142f04ab77bc6510

    • SHA512

      f8764308302ec4088ba5c2f6ea8efc06de66e771932d42a22b449fcfb32b3afc5fdf98a7417291cbef36cfcdbbf494b3983faa03bef43c3bb9c16a1bfb796f19

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks