General

  • Target

    Belle Delphine Nudes Leaked!.zip

  • Size

    7.2MB

  • Sample

    230128-j4ydmsfh3v

  • MD5

    6951853a77f029d0cbde95a21639362c

  • SHA1

    f706a1f17f60bfbd2e24d40df977643bc0f099f4

  • SHA256

    8d8083a15c3ed42eae1336ff0060628915f58b60ee35e95b18843b5711b13372

  • SHA512

    32abdad804d2317b65b952f154aba4d7041d7fe2e215757192ef8198e09bdf905666f1f06d7e773461997f8214ac5f147bfedd3d306905a8946ed676337d6490

  • SSDEEP

    196608:yk/+6WmAb44jmh5ek/+6WmAb44jmh5Ik/+6WmAb44jmh5k:Z/+HJ41DF/+HJ41DX/+HJ41Dk

Malware Config

Targets

    • Target

      Belle Delphine Nudes Leaked!/Anal.scr

    • Size

      3.4MB

    • MD5

      ed6ea767354e940d79e591d21d8e1bbd

    • SHA1

      d07011f13100f7578506f45630cfdb73286a3e44

    • SHA256

      be790ab14ba841b5a5ae4fb7853924f33be7577b35a5565ca31fcd399b1ad8f8

    • SHA512

      b653626e2d42d76d6daa48ecf779e053ab3bff1781c54519fe70f47bd97a03fcce3eed5dacb01edbae655b588ad4be138b2df29e604ddfd2cc0ff4f80b8da569

    • SSDEEP

      49152:EbA37QXuXj2m0oENBxCFk+M0/V5Z7dTMjPvxQp0VR4NOjtSskvRIaqiZd:EbXXuiyENBE209BqnOmeMjYsqR7d

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      Belle Delphine Nudes Leaked!/Big Dildo Riding.scr

    • Size

      3.4MB

    • MD5

      ed6ea767354e940d79e591d21d8e1bbd

    • SHA1

      d07011f13100f7578506f45630cfdb73286a3e44

    • SHA256

      be790ab14ba841b5a5ae4fb7853924f33be7577b35a5565ca31fcd399b1ad8f8

    • SHA512

      b653626e2d42d76d6daa48ecf779e053ab3bff1781c54519fe70f47bd97a03fcce3eed5dacb01edbae655b588ad4be138b2df29e604ddfd2cc0ff4f80b8da569

    • SSDEEP

      49152:EbA37QXuXj2m0oENBxCFk+M0/V5Z7dTMjPvxQp0VR4NOjtSskvRIaqiZd:EbXXuiyENBE209BqnOmeMjYsqR7d

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      Belle Delphine Nudes Leaked!/Titty Drop.scr

    • Size

      3.4MB

    • MD5

      ed6ea767354e940d79e591d21d8e1bbd

    • SHA1

      d07011f13100f7578506f45630cfdb73286a3e44

    • SHA256

      be790ab14ba841b5a5ae4fb7853924f33be7577b35a5565ca31fcd399b1ad8f8

    • SHA512

      b653626e2d42d76d6daa48ecf779e053ab3bff1781c54519fe70f47bd97a03fcce3eed5dacb01edbae655b588ad4be138b2df29e604ddfd2cc0ff4f80b8da569

    • SSDEEP

      49152:EbA37QXuXj2m0oENBxCFk+M0/V5Z7dTMjPvxQp0VR4NOjtSskvRIaqiZd:EbXXuiyENBE209BqnOmeMjYsqR7d

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

3
T1053

Persistence

Winlogon Helper DLL

3
T1004

Registry Run Keys / Startup Folder

3
T1060

Scheduled Task

3
T1053

Privilege Escalation

Scheduled Task

3
T1053

Defense Evasion

Modify Registry

6
T1112

Discovery

System Information Discovery

3
T1082

Tasks