General
-
Target
AE40B1604E91A796697711123B511B4404635B7297C4E.exe
-
Size
4MB
-
Sample
220912-jptrxacge7
-
MD5
1ec352f87b2a0f057fad1a1d8fdb4fb0
-
SHA1
6fde03bf354eb22766eeda3063c5513257723ee6
-
SHA256
ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc
-
SHA512
047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f
-
SSDEEP
98304:I+m3o+rxVmA8OM6KPigiaFfqw1crsT/e3Le7dqc:It42VmhOM6KPNiSqw1cwTu+l
Static task
static1
Behavioral task
behavioral1
Sample
AE40B1604E91A796697711123B511B4404635B7297C4E.exe
Resource
win7-20220812-en
Malware Config
Extracted
colibri
1.2.0
Build1
http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php
http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php
Targets
-
-
Target
AE40B1604E91A796697711123B511B4404635B7297C4E.exe
-
Size
4MB
-
MD5
1ec352f87b2a0f057fad1a1d8fdb4fb0
-
SHA1
6fde03bf354eb22766eeda3063c5513257723ee6
-
SHA256
ae40b1604e91a796697711123b511b4404635b7297c4edbf018d2891988ee8cc
-
SHA512
047835a8ea448330815d796ae77459c667f328bef4f6e0ace9505f9b2cae0f2db9c13582401a53a676c252d8d1d8bfdc09a5fa3f8e2776b03bb55f4a8a080b0f
-
SSDEEP
98304:I+m3o+rxVmA8OM6KPigiaFfqw1crsT/e3Le7dqc:It42VmhOM6KPNiSqw1cwTu+l
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation