General

  • Target

    625ed8296450d13587142822e16d7d61

  • Size

    1.5MB

  • Sample

    221128-3qvkdafh5z

  • MD5

    625ed8296450d13587142822e16d7d61

  • SHA1

    ead1ac1c30fc324d24e3cc48c8ecc853a65b5f96

  • SHA256

    ffcd742b9d74fe93829e1b9955611e7cf9cd1e315776948a604a47cbd6aa6e93

  • SHA512

    56357e909af6010e4e36282e646fff87febe8b3942905c3d0a05b97b19be10aceaa4ba3465cd4280c80c5a037ed200291af2823dea680ec14774302162471187

  • SSDEEP

    24576:L3m8i6zoGcFauvhT+elS5EH4LR40AFfThq7metAHEk:

Malware Config

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain

Targets

    • Target

      625ed8296450d13587142822e16d7d61

    • Size

      1.5MB

    • MD5

      625ed8296450d13587142822e16d7d61

    • SHA1

      ead1ac1c30fc324d24e3cc48c8ecc853a65b5f96

    • SHA256

      ffcd742b9d74fe93829e1b9955611e7cf9cd1e315776948a604a47cbd6aa6e93

    • SHA512

      56357e909af6010e4e36282e646fff87febe8b3942905c3d0a05b97b19be10aceaa4ba3465cd4280c80c5a037ed200291af2823dea680ec14774302162471187

    • SSDEEP

      24576:L3m8i6zoGcFauvhT+elS5EH4LR40AFfThq7metAHEk:

    • Colibri Loader

      A loader sold as MaaS first seen in August 2021.

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks